{"id":284,"date":"2020-01-29T11:34:14","date_gmt":"2020-01-29T11:34:14","guid":{"rendered":"https:\/\/partnernews.sophos.com\/fr-fr\/?p=284"},"modified":"2025-03-12T14:37:48","modified_gmt":"2025-03-12T14:37:48","slug":"important-new-research-on-potential-ransomware-attack-method","status":"publish","type":"post","link":"https:\/\/partnernews.sophos.com\/fr-fr\/2020\/01\/products\/important-new-research-on-potential-ransomware-attack-method\/","title":{"rendered":"Important\u00a0: D\u00e9couverte d\u2019un possible nouveau type de ransomware"},"content":{"rendered":"<p>Des chercheurs ont d\u00e9couvert un possible nouveau type de ransomware. Nous publions actuellement des mises \u00e0 jour produit pour veiller \u00e0 ce que tous nos utilisateurs restent prot\u00e9g\u00e9s. Poursuivez votre lecture pour obtenir des informations \u00e0 partager avec vos clients.<\/p>\n<p><strong>Quelles sont les caract\u00e9ristiques de ce nouveau ransomware\u00a0?<\/strong><br \/>\nLes chercheurs externes de Safebreach Labs ont partag\u00e9 les r\u00e9sultats de leurs recherches sur un nouveau type pr\u00e9sum\u00e9 de ransomware qui exploiterait le syst\u00e8me de fichiers EFS (Encrypting File System) de Windows pour chiffrer des fichiers et r\u00e9clamer une ran\u00e7on. Ce type d\u2019attaque, qui n\u2019a pas encore \u00e9t\u00e9 d\u00e9tect\u00e9 en situation r\u00e9elle, exploite une vuln\u00e9rabilit\u00e9 du syst\u00e8me Windows. \u00c0 l\u2019heure o\u00f9 nous \u00e9crivons cet article, nous ne savons pas si Microsoft pr\u00e9voit de publier un correctif.<\/p>\n<p><strong>Les clients sont-ils prot\u00e9g\u00e9s\u00a0?<\/strong><br \/>\nCette nouvelle attaque \u00e9tant un type de ransomware, tous les produits contenant CryptoGuard sont concern\u00e9s. Voici les d\u00e9tails de chaque produit\u00a0:<\/p>\n<p><strong>Intercept X\/Intercept X Advanced\/Intercept X Advanced with EDR<\/strong><br \/>\nUne mesure de pr\u00e9vention a \u00e9t\u00e9 ajout\u00e9e.<\/p>\n<p><strong>Intercept X Advanced for Server\/Intercept X Advanced for Server with EDR<\/strong><br \/>\nUne mesure de pr\u00e9vention a \u00e9t\u00e9 ajout\u00e9e au programme d\u2019acc\u00e8s anticip\u00e9 (EAP) d\u2019<a href=\"https:\/\/community.sophos.com\/products\/intercept\/early-access-program\/b\/blog\/posts\/enhanced-protection-eap-going-to-server\" target=\"_blank\" rel=\"noopener noreferrer\">Intercept X for Server<\/a>. Les clients qui participent d\u00e9j\u00e0 ou pr\u00e9voient de s\u2019inscrire au programme EAP b\u00e9n\u00e9ficieront automatiquement de cette mesure de pr\u00e9vention. Sa disponibilit\u00e9 g\u00e9n\u00e9rale est pr\u00e9vue pour le 5\u00a0f\u00e9vrier 2020.<\/p>\n<p><strong>Endpoint Exploit Prevention<\/strong><br \/>\nLe lancement de cette mesure de pr\u00e9vention est pr\u00e9vu pour la deuxi\u00e8me quinzaine de f\u00e9vrier 2020. Les clients Endpoint Exploit Prevention seront avertis par email.<\/p>\n<p><strong>Existe-t-il un article de la base de connaissances que je puisse partager avec mes clients\u00a0?<\/strong><br \/>\nOui. C\u2019est l\u2019article\u00a0<a href=\"https:\/\/community.sophos.com\/kb\/fr-fr\/135056\" target=\"_blank\" rel=\"noopener noreferrer\">KBA135056<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Des chercheurs ont d\u00e9couvert un possible nouveau type de ransomware. Nous publions actuellement des mises \u00e0 jour produit pour veiller \u00e0 ce que tous nos utilisateurs restent prot\u00e9g\u00e9s.<\/p>\n","protected":false},"author":11,"featured_media":185,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[74],"tags":[21],"coauthors":[],"class_list":["post-284","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-products","tag-menaces-malwares"],"jetpack_featured_media_url":"https:\/\/partnernews.sophos.com\/fr-fr\/wp-content\/uploads\/sites\/4\/2019\/11\/featured-image-cyberthreat-shield.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/partnernews.sophos.com\/fr-fr\/wp-json\/wp\/v2\/posts\/284","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/partnernews.sophos.com\/fr-fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/partnernews.sophos.com\/fr-fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/fr-fr\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/fr-fr\/wp-json\/wp\/v2\/comments?post=284"}],"version-history":[{"count":1,"href":"https:\/\/partnernews.sophos.com\/fr-fr\/wp-json\/wp\/v2\/posts\/284\/revisions"}],"predecessor-version":[{"id":285,"href":"https:\/\/partnernews.sophos.com\/fr-fr\/wp-json\/wp\/v2\/posts\/284\/revisions\/285"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/fr-fr\/wp-json\/wp\/v2\/media\/185"}],"wp:attachment":[{"href":"https:\/\/partnernews.sophos.com\/fr-fr\/wp-json\/wp\/v2\/media?parent=284"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/fr-fr\/wp-json\/wp\/v2\/categories?post=284"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/fr-fr\/wp-json\/wp\/v2\/tags?post=284"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/fr-fr\/wp-json\/wp\/v2\/coauthors?post=284"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}