Voici comment des hackers utilisent de simples images PNG pour pirater votre PC<\/title>\n<meta name=\"description\" content=\"Le groupe de cybercriminels d\u00e9ploie actuellement un malware qui vole des donn\u00e9es \u00e0 travers de simples images au format PNG.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.phonandroid.com\/voici-comment-des-hackers-utilisent-de-simples-images-pour-pirater-votre-pc.html\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Voici comment des hackers utilisent de simples images PNG pour pirater votre PC\" \/>\n<meta property=\"og:description\" content=\"Le groupe de cybercriminels d\u00e9ploie actuellement un malware qui vole des donn\u00e9es \u00e0 travers de simples images au format PNG.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.phonandroid.com\/voici-comment-des-hackers-utilisent-de-simples-images-pour-pirater-votre-pc.html\" \/>\n<meta property=\"og:site_name\" content=\"PhonAndroid\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/phonandroid\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-16T14:14:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-16T16:11:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wp-pa.phonandroid.com\/uploads\/2021\/09\/hackers-arnaque-revil-ransomware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"750\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Andry Nirina\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@phonandroid\" \/>\n<meta name=\"twitter:site\" content=\"@phonandroid\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andry Nirina\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.phonandroid.com\/voici-comment-des-hackers-utilisent-de-simples-images-pour-pirater-votre-pc.html#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.phonandroid.com\/voici-comment-des-hackers-utilisent-de-simples-images-pour-pirater-votre-pc.html\"},\"author\":{\"name\":\"Andry Nirina\",\"@id\":\"https:\/\/www.phonandroid.com\/#\/schema\/person\/67f2bc6bb88f474341af110793c64939\"},\"headline\":\"Voici comment des hackers utilisent de simples images PNG pour pirater votre PC\",\"datePublished\":\"2022-11-16T14:14:02+00:00\",\"dateModified\":\"2022-11-16T16:11:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.phonandroid.com\/voici-comment-des-hackers-utilisent-de-simples-images-pour-pirater-votre-pc.html\"},\"wordCount\":445,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.phonandroid.com\/#organization\"},\"articleSection\":[\"S\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.phonandroid.com\/voici-comment-des-hackers-utilisent-de-simples-images-pour-pirater-votre-pc.html#respond\"]}],\"copyrightYear\":\"2022\",\"copyrightHolder\":{\"@id\":\"https:\/\/www.phonandroid.com\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.phonandroid.com\/voici-comment-des-hackers-utilisent-de-simples-images-pour-pirater-votre-pc.html\",\"url\":\"https:\/\/www.phonandroid.com\/voici-comment-des-hackers-utilisent-de-simples-images-pour-pirater-votre-pc.html\",\"name\":\"Voici comment des hackers utilisent de simples images PNG pour pirater votre PC\",\"isPartOf\":{\"@id\":\"https:\/\/www.phonandroid.com\/#website\"},\"datePublished\":\"2022-11-16T14:14:02+00:00\",\"dateModified\":\"2022-11-16T16:11:32+00:00\",\"description\":\"Le groupe de cybercriminels d\u00e9ploie actuellement un malware qui vole des donn\u00e9es \u00e0 travers de simples images au format PNG.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.phonandroid.com\/voici-comment-des-hackers-utilisent-de-simples-images-pour-pirater-votre-pc.html#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.phonandroid.com\/voici-comment-des-hackers-utilisent-de-simples-images-pour-pirater-votre-pc.html\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.phonandroid.com\/voici-comment-des-hackers-utilisent-de-simples-images-pour-pirater-votre-pc.html#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.phonandroid.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Voici comment des hackers utilisent de simples images PNG pour pirater votre PC\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.phonandroid.com\/#website\",\"url\":\"https:\/\/www.phonandroid.com\/\",\"name\":\"PhonAndroid\",\"description\":\"PhonAndroid\",\"publisher\":{\"@id\":\"https:\/\/www.phonandroid.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.phonandroid.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.phonandroid.com\/#organization\",\"name\":\"PhonAndroid\",\"url\":\"https:\/\/www.phonandroid.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.phonandroid.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.phonandroid.com\/wp-content\/themes\/phonadroid-v3\/assets\/images\/lg-phonandroid-amp-4.png\",\"contentUrl\":\"https:\/\/img.phonandroid.com\/2023\/06\/dark.png\",\"width\":280,\"height\":60,\"caption\":\"PhonAndroid\"},\"image\":{\"@id\":\"https:\/\/www.phonandroid.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/phonandroid\",\"https:\/\/twitter.com\/phonandroid\",\"https:\/\/www.youtube.com\/user\/Phonandroidtv\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.phonandroid.com\/#\/schema\/person\/67f2bc6bb88f474341af110793c64939\",\"name\":\"Andry Nirina\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.phonandroid.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c93ef547f92f7537abd94237f6aaa337?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c93ef547f92f7537abd94237f6aaa337?s=96&d=mm&r=g\",\"caption\":\"Andry Nirina\"},\"description\":\"J\u2019aurais voulu \u00eatre un artiste, mais comme j\u2019\u00e9tais un peu paresseux, je suis devenu bassiste. Je voulais \u00e9galement \u00e9crire des romans de SF. Chanceux que je suis, me voil\u00e0 r\u00e9dacteur, car notre r\u00e9alit\u00e9 d\u00e9passe ma fiction. \u00ab Hit Play, Love \u00bb.\",\"url\":\"https:\/\/www.phonandroid.com\/author\/andry\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Voici comment des hackers utilisent de simples images PNG pour pirater votre PC","description":"Le groupe de cybercriminels d\u00e9ploie actuellement un malware qui vole des donn\u00e9es \u00e0 travers de simples images au format PNG.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.phonandroid.com\/voici-comment-des-hackers-utilisent-de-simples-images-pour-pirater-votre-pc.html","og_locale":"fr_FR","og_type":"article","og_title":"Voici comment des hackers utilisent de simples images PNG pour pirater votre PC","og_description":"Le groupe de cybercriminels d\u00e9ploie actuellement un malware qui vole des donn\u00e9es \u00e0 travers de simples images au format PNG.","og_url":"https:\/\/www.phonandroid.com\/voici-comment-des-hackers-utilisent-de-simples-images-pour-pirater-votre-pc.html","og_site_name":"PhonAndroid","article_publisher":"https:\/\/www.facebook.com\/phonandroid","article_published_time":"2022-11-16T14:14:02+00:00","article_modified_time":"2022-11-16T16:11:32+00:00","og_image":[{"width":1200,"height":750,"url":"https:\/\/wp-pa.phonandroid.com\/uploads\/2021\/09\/hackers-arnaque-revil-ransomware.jpg","type":"image\/jpeg"}],"author":"Andry Nirina","twitter_card":"summary_large_image","twitter_creator":"@phonandroid","twitter_site":"@phonandroid","twitter_misc":{"Written by":"Andry Nirina","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.phonandroid.com\/voici-comment-des-hackers-utilisent-de-simples-images-pour-pirater-votre-pc.html#article","isPartOf":{"@id":"https:\/\/www.phonandroid.com\/voici-comment-des-hackers-utilisent-de-simples-images-pour-pirater-votre-pc.html"},"author":{"name":"Andry Nirina","@id":"https:\/\/www.phonandroid.com\/#\/schema\/person\/67f2bc6bb88f474341af110793c64939"},"headline":"Voici comment des hackers utilisent de simples images PNG pour pirater votre PC","datePublished":"2022-11-16T14:14:02+00:00","dateModified":"2022-11-16T16:11:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.phonandroid.com\/voici-comment-des-hackers-utilisent-de-simples-images-pour-pirater-votre-pc.html"},"wordCount":445,"commentCount":1,"publisher":{"@id":"https:\/\/www.phonandroid.com\/#organization"},"articleSection":["S\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.phonandroid.com\/voici-comment-des-hackers-utilisent-de-simples-images-pour-pirater-votre-pc.html#respond"]}],"copyrightYear":"2022","copyrightHolder":{"@id":"https:\/\/www.phonandroid.com\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.phonandroid.com\/voici-comment-des-hackers-utilisent-de-simples-images-pour-pirater-votre-pc.html","url":"https:\/\/www.phonandroid.com\/voici-comment-des-hackers-utilisent-de-simples-images-pour-pirater-votre-pc.html","name":"Voici comment des hackers utilisent de simples images PNG pour pirater votre PC","isPartOf":{"@id":"https:\/\/www.phonandroid.com\/#website"},"datePublished":"2022-11-16T14:14:02+00:00","dateModified":"2022-11-16T16:11:32+00:00","description":"Le groupe de cybercriminels d\u00e9ploie actuellement un malware qui vole des donn\u00e9es \u00e0 travers de simples images au format PNG.","breadcrumb":{"@id":"https:\/\/www.phonandroid.com\/voici-comment-des-hackers-utilisent-de-simples-images-pour-pirater-votre-pc.html#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.phonandroid.com\/voici-comment-des-hackers-utilisent-de-simples-images-pour-pirater-votre-pc.html"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.phonandroid.com\/voici-comment-des-hackers-utilisent-de-simples-images-pour-pirater-votre-pc.html#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.phonandroid.com\/"},{"@type":"ListItem","position":2,"name":"Voici comment des hackers utilisent de simples images PNG pour pirater votre PC"}]},{"@type":"WebSite","@id":"https:\/\/www.phonandroid.com\/#website","url":"https:\/\/www.phonandroid.com\/","name":"PhonAndroid","description":"PhonAndroid","publisher":{"@id":"https:\/\/www.phonandroid.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.phonandroid.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.phonandroid.com\/#organization","name":"PhonAndroid","url":"https:\/\/www.phonandroid.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.phonandroid.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.phonandroid.com\/wp-content\/themes\/phonadroid-v3\/assets\/images\/lg-phonandroid-amp-4.png","contentUrl":"https:\/\/img.phonandroid.com\/2023\/06\/dark.png","width":280,"height":60,"caption":"PhonAndroid"},"image":{"@id":"https:\/\/www.phonandroid.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/phonandroid","https:\/\/twitter.com\/phonandroid","https:\/\/www.youtube.com\/user\/Phonandroidtv"]},{"@type":"Person","@id":"https:\/\/www.phonandroid.com\/#\/schema\/person\/67f2bc6bb88f474341af110793c64939","name":"Andry Nirina","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.phonandroid.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c93ef547f92f7537abd94237f6aaa337?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c93ef547f92f7537abd94237f6aaa337?s=96&d=mm&r=g","caption":"Andry Nirina"},"description":"J\u2019aurais voulu \u00eatre un artiste, mais comme j\u2019\u00e9tais un peu paresseux, je suis devenu bassiste. Je voulais \u00e9galement \u00e9crire des romans de SF. Chanceux que je suis, me voil\u00e0 r\u00e9dacteur, car notre r\u00e9alit\u00e9 d\u00e9passe ma fiction. \u00ab Hit Play, Love \u00bb.","url":"https:\/\/www.phonandroid.com\/author\/andry"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/posts\/2496832","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/users\/130"}],"replies":[{"embeddable":true,"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/comments?post=2496832"}],"version-history":[{"count":18,"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/posts\/2496832\/revisions"}],"predecessor-version":[{"id":2496877,"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/posts\/2496832\/revisions\/2496877"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/media\/2404922"}],"wp:attachment":[{"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/media?parent=2496832"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/categories?post=2496832"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/tags?post=2496832"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}

{"id":2496832,"date":"2022-11-16T15:14:02","date_gmt":"2022-11-16T14:14:02","guid":{"rendered":"https:\/\/www.phonandroid.com\/?p=2496832"},"modified":"2022-11-16T17:11:32","modified_gmt":"2022-11-16T16:11:32","slug":"voici-comment-des-hackers-utilisent-de-simples-images-pour-pirater-votre-pc","status":"publish","type":"post","link":"https:\/\/www.phonandroid.com\/voici-comment-des-hackers-utilisent-de-simples-images-pour-pirater-votre-pc.html","title":{"rendered":"Voici comment des hackers utilisent de simples images PNG pour pirater votre PC"},"content":{"rendered":"

Les chercheurs en cybers\u00e9curit\u00e9 d\u2019Avast ont d\u00e9voil\u00e9 une vaste op\u00e9ration d\u2019espionnage qui met \u00e0 profit des techniques de st\u00e9ganographie. Les cybercriminels de Worok cachent leur code malfaisant dans des images pour voler des informations \u00e0 leurs cibles.<\/strong><\/p>\n

\"hacker\"<\/p>\n

Selon les experts, Worok utilise un outil d\u2019espionnage extr\u00eamement sophistiqu\u00e9. Ce dernier a \u00e9t\u00e9 con\u00e7u pour exfiltrer des informations de l\u2019ordinateur de sa cible \u00e0 travers un fichier au format PNG<\/strong>. Son code est dissimul\u00e9 dans une image tout ce qu\u2019il y a de plus normale. Ce malware est apparu sur les radars d\u2019ESET d\u00e8s septembre 2022. Le logiciel Stegmap se cachait alors dans un logo de Windows<\/a> pour infecter l\u2019ordinateur de ses victimes.<\/p>\n

\u00c0 lire \u2014 <\/strong>Comment des hackers peuvent pirater vos mots de passe \u00e0 l\u2019aide d\u2019une cam\u00e9ra thermique<\/strong><\/a><\/p>\n

La nouvelle campagne d\u2019attaques men\u00e9e par Worok<\/strong> se d\u00e9roule en plusieurs phases, ce qui les aide \u00e0 passer inaper\u00e7us. Avast n\u2019a pas r\u00e9ussi \u00e0 d\u00e9terminer quels outils exactement sont utilis\u00e9s, et ils n\u2019ont pas r\u00e9ussi \u00e0 savoir comment le virus parvient \u00e0 s\u2019infiltrer sur le r\u00e9seau des victimes. Ce qu\u2019ils connaissent un peu mieux en revanche, c\u2019est le mode op\u00e9ratoire du malware une fois qu\u2019il est en place. Une fois qu\u2019il a acc\u00e8s \u00e0 l\u2019ordinateur cibl\u00e9, le malware t\u00e9l\u00e9charge un virus, le CLRLoader, en se faisant passer pour une dll de Windows<\/strong> (Dynamic Link Library).<\/p>\n