{"id":1088,"date":"2015-10-26T13:25:45","date_gmt":"2015-10-26T12:25:45","guid":{"rendered":"http:\/\/www.ab-consulting.fr\/blog\/?p=1088"},"modified":"2015-10-26T13:47:44","modified_gmt":"2015-10-26T12:47:44","slug":"piratage-operateur-telecom","status":"publish","type":"post","link":"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom","title":{"rendered":"Encore un piratage d&rsquo;op\u00e9rateur mobile"},"content":{"rendered":"<p style=\"text-align: justify;\"><em>Apr\u00e8s le piratage, d\u00e9but octobre, de l&rsquo;op\u00e9rateur t\u00e9l\u00e9com T-Mobile aux USA, c&rsquo;est au tour de l&rsquo;op\u00e9rateur britannique TalkTalk d&rsquo;avoir\u00a0\u00e9t\u00e9 victime d&rsquo;une \u00ab cyberattaque \u00bb r\u00e9v\u00e9l\u00e9 en\u00a0fin de semaine derni\u00e8re. Cette cyber-attaque a permis \u00e0 des hackers de mettre la main sur un fichier complet de 4 millions de clients, donn\u00e9es bancaires comprises. Apparemment,\u00a0elle\u00a0a \u00e9t\u00e9 suivie d&rsquo;une demande de ran\u00e7on adress\u00e9e \u00e0 la Directrice G\u00e9n\u00e9rale de l&rsquo;op\u00e9rateur.<\/em><\/p>\n<p style=\"text-align: justify;\"><a href=\"http:\/\/plus.google.com\/118075462993454544693\/about\" target=\"_blank\" rel=\"Author\"><img loading=\"lazy\" class=\"aligncenter wp-image-1089\" src=\"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/talktalk.jpeg?resize=640%2C480\" alt=\"Op\u00e9rateur Talk Talk pirat\u00e9\" width=\"640\" height=\"480\" srcset=\"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/talktalk.jpeg?resize=300%2C225 300w, https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/talktalk.jpeg?w=640 640w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">L\u2019op\u00e9rateur de t\u00e9l\u00e9com britannique TalkTalk, qui fournit de la t\u00e9l\u00e9vision payante, des services de t\u00e9l\u00e9phonie fixe et mobile ainsi que\u00a0d\u2019acc\u00e8s \u00e0 internet, a reconnu jeudi, avoir \u00e9t\u00e9 victime d\u2019une\u00a0 \u00ab <em>cyber-attaque significative et durable<\/em>\u00a0\u00bb sur son site internet, apr\u00e8s l&rsquo;avoir\u00a0ferm\u00e9 mercredi sans explications. Des donn\u00e9es personnelles, et non des moindres, de 4 millions de clients auraient\u00a0potentiellement \u00e9t\u00e9 d\u00e9rob\u00e9es par les hackers, a avou\u00e9 la Directrice G\u00e9n\u00e9rale de la compagnie, Dido Harding. Les informations pirat\u00e9es inclueraient le nom, l&rsquo;adresse et les coordonn\u00e9es bancaires des clients de Talk Talk.<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" class=\"aligncenter wp-image-1105\" src=\"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/Talk-Talk-message-1.png?resize=640%2C130\" alt=\"piratage Talk Talk 1\/2\" width=\"640\" height=\"130\" srcset=\"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/Talk-Talk-message-1.png?resize=300%2C61 300w, https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/Talk-Talk-message-1.png?w=986 986w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" class=\"aligncenter wp-image-1106\" src=\"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/Talk-Talk-Message-2.png?resize=640%2C132\" alt=\"Piratage Talk Talk 2\/2\" width=\"640\" height=\"132\" srcset=\"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/Talk-Talk-Message-2.png?resize=300%2C62 300w, https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/Talk-Talk-Message-2.png?w=983 983w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><\/p>\n<h2 style=\"text-align: justify;\">Un piratage suivi d&rsquo;une demande de ran\u00e7on<\/h2>\n<p style=\"text-align: justify;\">La Directrice G\u00e9n\u00e9rale de TalkTalk s\u2019est pr\u00e9sent\u00e9e vendredi\u00a0devant les cam\u00e9ras de la <a href=\"http:\/\/www.bbc.co.uk\/news\/business-34618187\" target=\"_blank\">BBC<\/a> pour pr\u00e9senter ses excuses, et expliquer qu\u2019elle avait re\u00e7u un e-mail de demande de ran\u00e7on venant du hacker ou du groupe de hackers pr\u00e9sum\u00e9s. Elle est tent\u00e9e\u00a0d\u2019y voir un signe encourageant ; les hackers auraient du mal \u00e0 d\u00e9rober\u00a0de l\u2019argent directement \u00e0 partir des donn\u00e9es vol\u00e9es, et pr\u00e9f\u00e9reraient faire du chantage aupr\u00e8s du fournisseur d&rsquo;acc\u00e8s. Belle illustration\u00a0de la m\u00e9thode Cou\u00e9!!<\/p>\n<p style=\"text-align: justify;\">Dido Harding a \u00e9galement d\u00e9clar\u00e9 qu&rsquo;elle ne pouvait pas garantir que toutes les donn\u00e9es des clients qui ont \u00e9t\u00e9 vol\u00e9es \u00e9taient\u00a0crypt\u00e9es et elle a admis que, avec le recul, l&rsquo;entreprise aurait pu faire plus sur la s\u00e9curisation\u00a0des donn\u00e9es de ses clients. \u00ab\u00a0<em>La soci\u00e9t\u00e9 va maintenant\u00a0lancer une enqu\u00eate interne<\/em>\u00ab\u00a0,\u00a0a-t-elle d\u00e9clar\u00e9.<\/p>\n<p style=\"text-align: justify;\">Selon le site sp\u00e9cialis\u00e9\u00a0<a href=\"http:\/\/www.theregister.co.uk\/2015\/10\/23\/chaos_reigns_at_talktalk\/\" target=\"_blank\">The Register<\/a>, l\u2019acc\u00e8s aux donn\u00e9es bancaires aurait pu \u00eatre facilit\u00e9 par le fait que TalkTalk ne respecterait pas le standard PCI DSS qui fixe les normes de protection des donn\u00e9es des num\u00e9ros de carte de paiement. Dans un premier temps l\u2019entreprise avait tent\u00e9 d\u2019expliquer le piratage par une simple attaque DDOS, qui n\u2019explique en rien l\u2019acc\u00e8s \u00e0 des donn\u00e9es s\u00e9curis\u00e9es.<\/p>\n<p style=\"text-align: justify;\">Une enqu\u00eate a \u00e9t\u00e9 ouverte par l&rsquo;unit\u00e9 charg\u00e9e de la cyber-criminilatit\u00e9 de la police de Londres (\u00a0Metropolitan Police Cyber Crime Unit) qui a indiqu\u00e9 \u00eatre \u00ab\u00a0<em>au courant de sp\u00e9culations sur les auteurs pr\u00e9sum\u00e9s<\/em>\u00a0\u00bb de l&rsquo;attaque, sans les confirmer. Selon un ancien enqu\u00eateur de cette unit\u00e9 du cybercrime de Scotland Yard interview\u00e9 par BBC Radio 4, les auteurs \u00ab\u00a0<em>pr\u00e9tendent \u00eatre en Russie et \u00eatre un groupe jihadiste cyber-islamiste<\/em>\u00ab\u00a0.<\/p>\n<h2 style=\"text-align: justify;\">Attention aux tentatives d&rsquo;hame\u00e7onnage<\/h2>\n<p style=\"text-align: justify;\">Une <a href=\"http:\/\/help2.talktalk.co.uk\/oct22incident\" target=\"_blank\">page web d\u00e9di\u00e9e<\/a>, sur le site web de l&rsquo;op\u00e9rateur, a \u00e9t\u00e9 consacr\u00e9e \u00e0 la communication sur cet incident. Le Directeur de la Relation Clients\u00a0\u00a0de TalkTalk Tristia Harrison a cherch\u00e9 \u00e0 rassurer\u00a0les clients sur le fait que l&rsquo;entreprise est \u00aben train de prendre toutes les mesures possibles\u00a0\u00bb afin de\u00a0garder leurs informations en toute s\u00e9curit\u00e9 alors que, de l&rsquo;aveu m\u00eame de TalkTalk, les donn\u00e9es n&rsquo;\u00e9taient pas compl\u00e8tement crypt\u00e9es.<\/p>\n<p>Cette page web mentionne par ailleurs, en caract\u00e8res gras:<\/p>\n<p style=\"text-align: justify;\">\u00ab\u00a0S&rsquo;il vous pla\u00eet, soyez bien conscient que TalkTalk n&rsquo;appelle JAMAIS\u00a0ses clients\u00a0pour leur demander de fournir des informations bancaires sauf\u00a0si vous\u00a0nous avez d\u00e9j\u00e0 donn\u00e9 explicitement\u00a0l&rsquo;autorisation de le faire\u00a0\u00bb. Il s&rsquo;agit clairement d&rsquo;une mise en garde des clients contre des tentatives redout\u00e9es d&rsquo;hame\u00e7onnage (phishing), ph\u00e9nom\u00e8ne extr\u00eamement fr\u00e9quent sur lequel nous vous avons mis en garde <a href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/10-indices-hameconnage\" target=\"_blank\">sur\u00a0notre blog<\/a> il y a encore quelques jours.<\/p>\n<p style=\"text-align: justify;\">Cet avertissement est probablement une r\u00e9action aux\u00a0incidents de f\u00e9vrier dernier, dans lequel les coordonn\u00e9es\u00a0des\u00a0clients de Talk Talk, vol\u00e9es lors du piratage\u00a0affectant l&rsquo;un des partenaires de l&rsquo;op\u00e9rateur,\u00a0ont \u00e9t\u00e9 utilis\u00e9es pour extorquer de l&rsquo;argent par t\u00e9l\u00e9phone aux clients de TalkTalk.<\/p>\n<p style=\"text-align: justify;\">Malheureusement,\u00a0ce\u00a0ne sont pas les seules fois o\u00f9 TalkTalk a \u00e9t\u00e9 victime de\u00a0cybercriminalit\u00e9. En Ao\u00fbt dernier, Carphone Warehouse a subi une cyber-attaque sur son syst\u00e8me informatique conduisant \u00e0 un vol\u00a0de donn\u00e9es\u00a0affectant\u00a02,4 millions de clients de Dixon Carphone incluant, par ricochet\u00a0ceux qui avaient\u00a0souscrit un abonnement \u00e0 TalkTalk Mobile.<\/p>\n<h2 style=\"text-align: justify;\">Des cons\u00e9quences f\u00e2cheuses \u00e0 pr\u00e9voir pour l&rsquo;op\u00e9rateur<\/h2>\n<p style=\"text-align: justify;\">L&rsquo;affaire pourrait avoir des cons\u00e9quences beaucoup plus\u00a0f\u00e2cheuses pour l&rsquo;op\u00e9rateur et pour ses clients. Le lendemain de la r\u00e9v\u00e9lation\u00a0de l&rsquo;incident, le titre de TalkTalk perdait pr\u00e8s de\u00a010 % en bourse, les investisseurs anticipant logiquement une perte de confiance des clients envers un op\u00e9rateur qui, visiblement, n\u2019a pas correctement crypt\u00e9\u00a0et s\u00e9curis\u00e9 les donn\u00e9es bancaires de ses abonn\u00e9s, qui sont les informations les plus sensibles (\u00e0 cet \u00e9gard le piratage d\u2019Orange en 2014, qui avait fait 1 million de victimes, \u00e9tait beaucoup\u00a0moins grave).<\/p>\n<p style=\"text-align: justify;\">Par ailleurs, la l\u00e9gislation Britannique est, \u00e0 ce niveau, beaucoup plus contraignante que la l\u00e9gislation des pays francophones qui reste tr\u00e8s en retrait sur ce type de probl\u00e8mes. L&rsquo;op\u00e9rateur britannique risque en effet, s&rsquo;il se confirme que ses donn\u00e9es clients n&rsquo;\u00e9taient pas correctement crypt\u00e9es, de devoir payer une amende importante (plus de 200.000 \u20ac) sur demande de l&rsquo;ICO (Information Comissioner&rsquo;s Office).<\/p>\n<p style=\"text-align: justify;\">La survie m\u00eame de l&rsquo;op\u00e9rateur est menac\u00e9e car la d\u00e9gradation de son image risque fort de lui co\u00fbter la perte de bon nombre de ses clients, sans parler des co\u00fbts directs et indirects pour se remettre de l&rsquo;attaque subie.<\/p>\n<p style=\"text-align: justify;\">A titre de comparaison, le co\u00fbt de la cyber-attaque subie par TV5 Monde en Avril dernier\u00a0s\u2019\u00e9value d\u2019ores et d\u00e9j\u00e0, selon son Directeur G\u00e9n\u00e9ral Yves Bigot, entre 4,3 et 5 millions d\u2019Euros pour l\u2019ann\u00e9e 2015 et environ 11 millions d\u2019Euros pour les trois prochaines ann\u00e9es, pour un piratage aux impacts bien plus limit\u00e9s. La\u00a0cyber-attaque du m\u00eame type que Talk Talk, visant le distributeur TARGET aux USA fin 2013 et ayant expos\u00e9 40 millions de clients, aurait d\u00e9j\u00e0 co\u00fbt\u00e9 \u00e0 l&rsquo;Entreprise pr\u00e8s de 500 millions de dollars en pertes cons\u00e9cutives \u00e0 cet incident.<\/p>\n<h2 style=\"text-align: justify;\">Comment ne pas en arriver l\u00e0?<\/h2>\n<p style=\"text-align: justify;\">La cl\u00e9 pour ne pas en arriver \u00e0 ce type d&rsquo;incident est de pr\u00e9voir, avant qu&rsquo;une tentative de piratage n&rsquo;ait lieu, plut\u00f4t que de r\u00e9agir \u00e0 post\u00e9riori. La pr\u00e9vention commence par la sensibilisation de tout le personnel \u00e0 la cyber-s\u00e9curit\u00e9 (voir notre article : <a href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/10-trucs-sensibilisation-securite\" target=\"_blank\">10 cl\u00e9s pour une sensibilisation r\u00e9ussie \u00e0 la s\u00e9curit\u00e9<\/a>).<\/p>\n<p style=\"text-align: justify;\">Il faut, bien entendu, \u00e9galement prendre les mesures techniques indispensables en vous appuyant sur vos \u00e9quipes informatiques. Mais la premi\u00e8re action consiste \u00e0 sensibiliser votre <em><strong>Conseil d&rsquo;Administration<\/strong><\/em> et votre <em><strong>Comit\u00e9 de Direction<\/strong><\/em> sur leurs responsabilit\u00e9s et les risques encourus par l&rsquo;Organisation car <em><strong>c&rsquo;est \u00e0\u00a0leur niveau<\/strong><\/em> que se situent les responsabilit\u00e9s de prise\u00a0des d\u00e9cisions <em><strong>d&rsquo;investissement sur la cyber-s\u00e9curit\u00e9 et la cyber-r\u00e9silience<\/strong><\/em>, et de\u00a0<em><strong>r\u00e9daction des politiques\u00a0de l&rsquo;Entreprise<\/strong><\/em>, incluant bien entendu la politique de s\u00e9curit\u00e9.<\/p>\n<p style=\"text-align: justify;\">AB Consulting, seul Organisme de Formation Accr\u00e9dit\u00e9 en Afrique par <a href=\"http:\/\/www.isaca.org\/Education\/COBIT-Education\/Pages\/Introduction-to-COBIT-5-Licensed-Training-Providers.aspx\" target=\"_blank\">ISACA<\/a>, <a href=\"https:\/\/apmg-cyber.com\/providers\/ab-consulting\" target=\"_blank\">APMG<\/a>, EXIN et <a href=\"https:\/\/www.axelos.com\/find-a-training-provider\/?country=Cote%20d%27Ivoire&amp;products=%5B19%5D\" target=\"_blank\">AXELOS<\/a> \u00a0sur les domaines\u00a0de la Gouvernance, de la \u00a0s\u00e9curit\u00e9 et de la cyber-r\u00e9silience vous propose des sessions de sensibilisation tout sp\u00e9cialement adapt\u00e9es\u00a0\u00e0\u00a0des cibles sp\u00e9cifiques (dirigeants, personnels des m\u00e9tiers, informaticiens) et\u00a0anim\u00e9es par un expert du domaine. Toutes sessions peuvent \u00eatre organis\u00e9es sur mesure pour votre Entreprise et se d\u00e9rouler dans vos locaux ou de fa\u00e7on d\u00e9localis\u00e9e, y compris sous forme de week-end :<\/p>\n<p style=\"text-align: justify;\"><a href=\"http:\/\/www.ab-consulting.fr\/formation\/resilia-overview.php\" target=\"_blank\">Sensibilisation \u00e0 RESILIA<\/a>\u00a0(2 formats : 4 heures ou 1 journ\u00e9e)<\/p>\n<p style=\"text-align: justify;\"><a href=\"http:\/\/www.ab-consulting.fr\/formation\/cobit-for-board-and-executives\" target=\"_blank\">COBIT 5 pour le Board et les Ex\u00e9cutifs<\/a>\u00a0(2 formats : 4 heures ou 1 journ\u00e9e)<\/p>\n<p style=\"text-align: justify;\"><a href=\"http:\/\/www.ab-consulting.fr\/formation\/iso-27001-introduction.php\" target=\"_blank\">Sensibilisation \u00e0 ISO 27001 \/ ISO 27002 pour les dirigeants<\/a>\u00a0(1 journ\u00e9e)<\/p>\n<p style=\"text-align: justify;\"><em><strong>Pour toute information compl\u00e9mentaire ou pour vous abonner \u00e0 notre newsletter, merci de compl\u00e9ter le formulaire de contact :<\/strong><\/em><\/p>\n<p style=\"text-align: justify;\"><div id='contact-form-1088'>\n<form action='http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom#contact-form-1088' method='post' class='contact-form commentsblock'>\n<script>\n\t\t\t( function () {\n\t\t\t\tconst contact_forms = document.getElementsByClassName('contact-form');\n\n\t\t\t\tfor ( const form of contact_forms ) {\n\t\t\t\t\tform.onsubmit = function() {\n\t\t\t\t\t\tconst buttons = form.getElementsByTagName('button');\n\n\t\t\t\t\t\tfor( const button of buttons ) {\n\t\t\t\t\t\t\tbutton.setAttribute('disabled', true);\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t} )();\n\t\t<\/script>\n<div class='grunion-field-wrap grunion-field-name-wrap'  >\n<label\n\t\t\t\tfor='g1088-nom'\n\t\t\t\tclass='grunion-field-label name'\n\t\t\t\t>Nom<span>(obligatoire)<\/span><\/label>\n<input\n\t\t\t\t\ttype='text'\n\t\t\t\t\tname='g1088-nom'\n\t\t\t\t\tid='g1088-nom'\n\t\t\t\t\tvalue=''\n\t\t\t\t\tclass='name' \n\t\t\t\t\trequired aria-required='true'\n\t\t\t\t\/>\n\t<\/div>\n\n<div class='grunion-field-wrap grunion-field-email-wrap'  >\n<label\n\t\t\t\tfor='g1088-email'\n\t\t\t\tclass='grunion-field-label email'\n\t\t\t\t>E-mail<span>(obligatoire)<\/span><\/label>\n<input\n\t\t\t\t\ttype='email'\n\t\t\t\t\tname='g1088-email'\n\t\t\t\t\tid='g1088-email'\n\t\t\t\t\tvalue=''\n\t\t\t\t\tclass='email' \n\t\t\t\t\trequired aria-required='true'\n\t\t\t\t\/>\n\t<\/div>\n\n<div class='grunion-field-wrap grunion-field-text-wrap'  >\n<label\n\t\t\t\tfor='g1088-entreprise'\n\t\t\t\tclass='grunion-field-label text'\n\t\t\t\t>Entreprise<span>(obligatoire)<\/span><\/label>\n<input\n\t\t\t\t\ttype='text'\n\t\t\t\t\tname='g1088-entreprise'\n\t\t\t\t\tid='g1088-entreprise'\n\t\t\t\t\tvalue=''\n\t\t\t\t\tclass='text' \n\t\t\t\t\trequired aria-required='true'\n\t\t\t\t\/>\n\t<\/div>\n\n<div class='grunion-field-wrap grunion-field-text-wrap'  >\n<label\n\t\t\t\tfor='g1088-pays'\n\t\t\t\tclass='grunion-field-label text'\n\t\t\t\t>Pays<span>(obligatoire)<\/span><\/label>\n<input\n\t\t\t\t\ttype='text'\n\t\t\t\t\tname='g1088-pays'\n\t\t\t\t\tid='g1088-pays'\n\t\t\t\t\tvalue=''\n\t\t\t\t\tclass='text' \n\t\t\t\t\trequired aria-required='true'\n\t\t\t\t\/>\n\t<\/div>\n\n<div class='grunion-field-wrap grunion-field-url-wrap'  >\n<label\n\t\t\t\tfor='g1088-siteweb'\n\t\t\t\tclass='grunion-field-label url'\n\t\t\t\t>Site Web<\/label>\n<input\n\t\t\t\t\ttype='url'\n\t\t\t\t\tname='g1088-siteweb'\n\t\t\t\t\tid='g1088-siteweb'\n\t\t\t\t\tvalue=''\n\t\t\t\t\tclass='url' \n\t\t\t\t\t\n\t\t\t\t\/>\n\t<\/div>\n\n<div class='grunion-field-wrap grunion-field-textarea-wrap'  >\n<label\n\t\t\t\tfor='contact-form-comment-g1088-commentaire'\n\t\t\t\tclass='grunion-field-label textarea'\n\t\t\t\t>Commentaire<span>(obligatoire)<\/span><\/label>\n<textarea\n\t\t                name='g1088-commentaire'\n\t\t                id='contact-form-comment-g1088-commentaire'\n\t\t                rows='20' class='textarea'  required aria-required='true'><\/textarea>\n\t<\/div>\n\t<p class='contact-submit'>\n\t\t<button type='submit' class='pushbutton-wide'>Envoyer<\/button>\t\t<input type='hidden' name='contact-form-id' value='1088' \/>\n\t\t<input type='hidden' name='action' value='grunion-contact-form' \/>\n\t\t<input type='hidden' name='contact-form-hash' value='6db31058a10d04cba21507e3421cf9df964beed5' \/>\n\t<\/p>\n<p style=\"display: none !important;\" class=\"akismet-fields-container\" data-prefix=\"ak_\"><label>&#916;<textarea name=\"ak_hp_textarea\" cols=\"45\" rows=\"8\" maxlength=\"100\"><\/textarea><\/label><input type=\"hidden\" id=\"ak_js_1\" name=\"ak_js\" value=\"190\"\/><script type=\"text\/javascript\">\ndocument.getElementById( \"ak_js_1\" ).setAttribute( \"value\", ( new Date() ).getTime() );\n<\/script>\n<\/p><\/form>\n<\/div><\/p>\n<p style=\"text-align: justify;\">\n<div class=\"sharedaddy sd-sharing-enabled\"><div class=\"robots-nocontent sd-block sd-social sd-social-icon-text sd-sharing\"><h3 class=\"sd-title\">Partager\u00a0:<\/h3><div class=\"sd-content\"><ul><li class=\"share-print\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-print sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom\" target=\"_blank\" title=\"Cliquer pour imprimer\" ><span>Imprimer<\/span><\/a><\/li><li class=\"share-email\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-email sd-button share-icon\" href=\"mailto:?subject=%5BArticle%20partag%C3%A9%5D%20Encore%20un%20piratage%20d%27op%C3%A9rateur%20mobile&body=http%3A%2F%2Fwww.ab-consulting.fr%2Fblog%2Fsecurite%2Fpiratage-operateur-telecom&share=email\" target=\"_blank\" title=\"Cliquer pour envoyer un lien par e-mail \u00e0 un ami\" data-email-share-error-title=\"Votre messagerie est-elle configur\u00e9e\u00a0?\" data-email-share-error-text=\"Si vous rencontrez des probl\u00e8mes de partage par e-mail, votre messagerie n\u2019est peut-\u00eatre pas configur\u00e9e pour votre navigateur. Vous devrez peut-\u00eatre cr\u00e9er vous-m\u00eame une nouvelle messagerie.\" data-email-share-nonce=\"9997b84281\" data-email-share-track-url=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom?share=email\"><span>E-mail<\/span><\/a><\/li><li class=\"share-facebook\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-facebook-1088\" class=\"share-facebook sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom?share=facebook\" target=\"_blank\" title=\"Cliquez pour partager sur Facebook\" ><span>Facebook<\/span><\/a><\/li><li class=\"share-twitter\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-twitter-1088\" class=\"share-twitter sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom?share=twitter\" target=\"_blank\" title=\"Cliquez pour partager sur Twitter\" ><span>Twitter<\/span><\/a><\/li><li class=\"share-linkedin\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-linkedin-1088\" class=\"share-linkedin sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom?share=linkedin\" target=\"_blank\" title=\"Cliquez pour partager sur LinkedIn\" ><span>LinkedIn<\/span><\/a><\/li><li class=\"share-tumblr\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-tumblr sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom?share=tumblr\" target=\"_blank\" title=\"Cliquez pour partager sur Tumblr\" ><span>Tumblr<\/span><\/a><\/li><li class=\"share-pinterest\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-pinterest-1088\" class=\"share-pinterest sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom?share=pinterest\" target=\"_blank\" title=\"Cliquez pour partager sur Pinterest\" ><span>Pinterest<\/span><\/a><\/li><li class=\"share-end\"><\/li><\/ul><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Apr\u00e8s le piratage, d\u00e9but octobre, de l&rsquo;op\u00e9rateur t\u00e9l\u00e9com T-Mobile aux USA, c&rsquo;est au tour de l&rsquo;op\u00e9rateur britannique TalkTalk d&rsquo;avoir\u00a0\u00e9t\u00e9 victime d&rsquo;une \u00ab cyberattaque \u00bb r\u00e9v\u00e9l\u00e9 en\u00a0fin de semaine derni\u00e8re. Cette cyber-attaque a permis \u00e0 des hackers de mettre la main sur un fichier complet de 4 millions de clients, donn\u00e9es bancaires comprises. Apparemment,\u00a0elle\u00a0a \u00e9t\u00e9&#8230;<\/p>\n<p class=\"read-more\"><a class=\"btn btn-default\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom\"> Read More<span class=\"screen-reader-text\">  Read More<\/span><\/a><\/p>\n<div class=\"sharedaddy sd-sharing-enabled\"><div class=\"robots-nocontent sd-block sd-social sd-social-icon-text sd-sharing\"><h3 class=\"sd-title\">Partager\u00a0:<\/h3><div class=\"sd-content\"><ul><li class=\"share-print\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-print sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom\" target=\"_blank\" title=\"Cliquer pour imprimer\" ><span>Imprimer<\/span><\/a><\/li><li class=\"share-email\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-email sd-button share-icon\" href=\"mailto:?subject=%5BArticle%20partag%C3%A9%5D%20Encore%20un%20piratage%20d%27op%C3%A9rateur%20mobile&body=http%3A%2F%2Fwww.ab-consulting.fr%2Fblog%2Fsecurite%2Fpiratage-operateur-telecom&share=email\" target=\"_blank\" title=\"Cliquer pour envoyer un lien par e-mail \u00e0 un ami\" data-email-share-error-title=\"Votre messagerie est-elle configur\u00e9e\u00a0?\" data-email-share-error-text=\"Si vous rencontrez des probl\u00e8mes de partage par e-mail, votre messagerie n\u2019est peut-\u00eatre pas configur\u00e9e pour votre navigateur. Vous devrez peut-\u00eatre cr\u00e9er vous-m\u00eame une nouvelle messagerie.\" data-email-share-nonce=\"9997b84281\" data-email-share-track-url=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom?share=email\"><span>E-mail<\/span><\/a><\/li><li class=\"share-facebook\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-facebook-1088\" class=\"share-facebook sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom?share=facebook\" target=\"_blank\" title=\"Cliquez pour partager sur Facebook\" ><span>Facebook<\/span><\/a><\/li><li class=\"share-twitter\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-twitter-1088\" class=\"share-twitter sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom?share=twitter\" target=\"_blank\" title=\"Cliquez pour partager sur Twitter\" ><span>Twitter<\/span><\/a><\/li><li class=\"share-linkedin\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-linkedin-1088\" class=\"share-linkedin sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom?share=linkedin\" target=\"_blank\" title=\"Cliquez pour partager sur LinkedIn\" ><span>LinkedIn<\/span><\/a><\/li><li class=\"share-tumblr\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-tumblr sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom?share=tumblr\" target=\"_blank\" title=\"Cliquez pour partager sur Tumblr\" ><span>Tumblr<\/span><\/a><\/li><li class=\"share-pinterest\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-pinterest-1088\" class=\"share-pinterest sd-button share-icon\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom?share=pinterest\" target=\"_blank\" title=\"Cliquez pour partager sur Pinterest\" ><span>Pinterest<\/span><\/a><\/li><li class=\"share-end\"><\/li><\/ul><\/div><\/div><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","jetpack_post_was_ever_published":false,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true},"categories":[73,62],"tags":[80,133,172,153,183,180,101,127,69,173,107,142,175,126,64,68,134,182,154,125,171,100,87,109,184],"jetpack_publicize_connections":[],"author_meta":{"display_name":"Alain Bonneaud","author_link":"http:\/\/www.ab-consulting.fr\/blog\/author\/abonneaud"},"featured_img":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v17.9 (Yoast SEO v17.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Encore un piratage d&#039;op\u00e9rateur mobile - Blog de la Transformation Digitale<\/title>\n<meta name=\"description\" content=\"L&#039;op\u00e9rateur t\u00e9l\u00e9com britannique Talk Talk reconna\u00eet le piratage de son site internet et le vol des donn\u00e9es personnelles de 4 millions de personnes\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Encore un piratage d&#039;op\u00e9rateur mobile\" \/>\n<meta property=\"og:description\" content=\"L&#039;op\u00e9rateur t\u00e9l\u00e9com britannique Talk Talk reconna\u00eet le piratage de son site internet et le vol des donn\u00e9es personnelles de 4 millions de personnes\" \/>\n<meta property=\"og:url\" content=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom\" \/>\n<meta property=\"og:site_name\" content=\"Blog de la Transformation Digitale\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/abconsultingci\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-26T12:25:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-10-26T12:47:44+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/talktalk-300x225.jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@abonneaud\" \/>\n<meta name=\"twitter:site\" content=\"@abonneaud\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alain Bonneaud\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture est.\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/#organization\",\"name\":\"2AB & Associates\",\"url\":\"https:\/\/www.ab-consulting.fr\/blog\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/abconsultingci\/\",\"https:\/\/www.linkedin.com\/in\/alainbonneaud\/\",\"https:\/\/twitter.com\/abonneaud\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/#logo\",\"inLanguage\":\"fr-FR\",\"url\":\"https:\/\/i2.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/04\/AB-Consulting-logo-h-vs.gif?fit=540%2C107\",\"contentUrl\":\"https:\/\/i2.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/04\/AB-Consulting-logo-h-vs.gif?fit=540%2C107\",\"width\":540,\"height\":107,\"caption\":\"2AB & Associates\"},\"image\":{\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/#website\",\"url\":\"https:\/\/www.ab-consulting.fr\/blog\/\",\"name\":\"Blog de la Transformation Digitale\",\"description\":\"COBIT\\u00ae, VeriSM, ITIL\\u00ae, RESILIA, ISO 27001, ISO 20000\",\"publisher\":{\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ab-consulting.fr\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"ImageObject\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom#primaryimage\",\"inLanguage\":\"fr-FR\",\"url\":\"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/talktalk.jpeg?fit=640%2C480\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/talktalk.jpeg?fit=640%2C480\",\"width\":640,\"height\":480,\"caption\":\"Op\\u00e9rateur Talk Talk pirat\\u00e9\"},{\"@type\":\"WebPage\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom#webpage\",\"url\":\"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom\",\"name\":\"Encore un piratage d'op\\u00e9rateur mobile - Blog de la Transformation Digitale\",\"isPartOf\":{\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom#primaryimage\"},\"datePublished\":\"2015-10-26T12:25:45+00:00\",\"dateModified\":\"2015-10-26T12:47:44+00:00\",\"description\":\"L'op\\u00e9rateur t\\u00e9l\\u00e9com britannique Talk Talk reconna\\u00eet le piratage de son site internet et le vol des donn\\u00e9es personnelles de 4 millions de personnes\",\"breadcrumb\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.ab-consulting.fr\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\\u00e9curit\\u00e9\",\"item\":\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"cybers\\u00e9curit\\u00e9\",\"item\":\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\/cybersecurite-securite\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Encore un piratage d&rsquo;op\\u00e9rateur mobile\"}]},{\"@type\":\"Article\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom#article\",\"isPartOf\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom#webpage\"},\"author\":{\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/#\/schema\/person\/56962e20fa3aaac4e03764204c57b25c\"},\"headline\":\"Encore un piratage d&rsquo;op\\u00e9rateur mobile\",\"datePublished\":\"2015-10-26T12:25:45+00:00\",\"dateModified\":\"2015-10-26T12:47:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom#webpage\"},\"wordCount\":1426,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/#organization\"},\"image\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/talktalk-300x225.jpeg\",\"keywords\":[\"COBIT\",\"cyber-attaque\",\"cyber-crime\",\"cyber-criminalit\\u00e9\",\"cyber-criminel\",\"cyber-menace\",\"cyber-r\\u00e9silience\",\"cyber-risque\",\"cyber-s\\u00e9curit\\u00e9\",\"cyber-terroriste\",\"cybers\\u00e9curit\\u00e9\",\"cyberterrorisme\",\"gestion de la s\\u00e9curit\\u00e9\",\"hacker\",\"ISO 27001\",\"ISO 27002\",\"menace de s\\u00e9curit\\u00e9\",\"piratage\",\"pirate\",\"pirate informatique\",\"politique de s\\u00e9curit\\u00e9\",\"resilia\",\"s\\u00e9curit\\u00e9\",\"s\\u00e9curit\\u00e9 de l'information\",\"Talk Talk\"],\"articleSection\":[\"cybers\\u00e9curit\\u00e9\",\"S\\u00e9curit\\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/#\/schema\/person\/56962e20fa3aaac4e03764204c57b25c\",\"name\":\"Alain Bonneaud\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.ab-consulting.fr\/blog\/#personlogo\",\"inLanguage\":\"fr-FR\",\"url\":\"http:\/\/0.gravatar.com\/avatar\/6d901ed6d3a81ad26a0335a7dae96b4f?s=96&d=mm&r=g\",\"contentUrl\":\"http:\/\/0.gravatar.com\/avatar\/6d901ed6d3a81ad26a0335a7dae96b4f?s=96&d=mm&r=g\",\"caption\":\"Alain Bonneaud\"},\"sameAs\":[\"http:\/\/www.ab-consulting.fr\",\"https:\/\/twitter.com\/abonneaud\"],\"url\":\"http:\/\/www.ab-consulting.fr\/blog\/author\/abonneaud\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Encore un piratage d'op\u00e9rateur mobile - Blog de la Transformation Digitale","description":"L'op\u00e9rateur t\u00e9l\u00e9com britannique Talk Talk reconna\u00eet le piratage de son site internet et le vol des donn\u00e9es personnelles de 4 millions de personnes","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom","og_locale":"fr_FR","og_type":"article","og_title":"Encore un piratage d'op\u00e9rateur mobile","og_description":"L'op\u00e9rateur t\u00e9l\u00e9com britannique Talk Talk reconna\u00eet le piratage de son site internet et le vol des donn\u00e9es personnelles de 4 millions de personnes","og_url":"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom","og_site_name":"Blog de la Transformation Digitale","article_publisher":"https:\/\/www.facebook.com\/abconsultingci\/","article_published_time":"2015-10-26T12:25:45+00:00","article_modified_time":"2015-10-26T12:47:44+00:00","og_image":[{"url":"http:\/\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/talktalk-300x225.jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@abonneaud","twitter_site":"@abonneaud","twitter_misc":{"\u00c9crit par":"Alain Bonneaud","Dur\u00e9e de lecture est.":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.ab-consulting.fr\/blog\/#organization","name":"2AB & Associates","url":"https:\/\/www.ab-consulting.fr\/blog\/","sameAs":["https:\/\/www.facebook.com\/abconsultingci\/","https:\/\/www.linkedin.com\/in\/alainbonneaud\/","https:\/\/twitter.com\/abonneaud"],"logo":{"@type":"ImageObject","@id":"https:\/\/www.ab-consulting.fr\/blog\/#logo","inLanguage":"fr-FR","url":"https:\/\/i2.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/04\/AB-Consulting-logo-h-vs.gif?fit=540%2C107","contentUrl":"https:\/\/i2.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/04\/AB-Consulting-logo-h-vs.gif?fit=540%2C107","width":540,"height":107,"caption":"2AB & Associates"},"image":{"@id":"https:\/\/www.ab-consulting.fr\/blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.ab-consulting.fr\/blog\/#website","url":"https:\/\/www.ab-consulting.fr\/blog\/","name":"Blog de la Transformation Digitale","description":"COBIT\u00ae, VeriSM, ITIL\u00ae, RESILIA, ISO 27001, ISO 20000","publisher":{"@id":"https:\/\/www.ab-consulting.fr\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ab-consulting.fr\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"ImageObject","@id":"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom#primaryimage","inLanguage":"fr-FR","url":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/talktalk.jpeg?fit=640%2C480","contentUrl":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/talktalk.jpeg?fit=640%2C480","width":640,"height":480,"caption":"Op\u00e9rateur Talk Talk pirat\u00e9"},{"@type":"WebPage","@id":"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom#webpage","url":"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom","name":"Encore un piratage d'op\u00e9rateur mobile - Blog de la Transformation Digitale","isPartOf":{"@id":"https:\/\/www.ab-consulting.fr\/blog\/#website"},"primaryImageOfPage":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom#primaryimage"},"datePublished":"2015-10-26T12:25:45+00:00","dateModified":"2015-10-26T12:47:44+00:00","description":"L'op\u00e9rateur t\u00e9l\u00e9com britannique Talk Talk reconna\u00eet le piratage de son site internet et le vol des donn\u00e9es personnelles de 4 millions de personnes","breadcrumb":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom"]}]},{"@type":"BreadcrumbList","@id":"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.ab-consulting.fr\/blog"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9","item":"http:\/\/www.ab-consulting.fr\/blog\/category\/securite"},{"@type":"ListItem","position":3,"name":"cybers\u00e9curit\u00e9","item":"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\/cybersecurite-securite"},{"@type":"ListItem","position":4,"name":"Encore un piratage d&rsquo;op\u00e9rateur mobile"}]},{"@type":"Article","@id":"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom#article","isPartOf":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom#webpage"},"author":{"@id":"https:\/\/www.ab-consulting.fr\/blog\/#\/schema\/person\/56962e20fa3aaac4e03764204c57b25c"},"headline":"Encore un piratage d&rsquo;op\u00e9rateur mobile","datePublished":"2015-10-26T12:25:45+00:00","dateModified":"2015-10-26T12:47:44+00:00","mainEntityOfPage":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom#webpage"},"wordCount":1426,"commentCount":1,"publisher":{"@id":"https:\/\/www.ab-consulting.fr\/blog\/#organization"},"image":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom#primaryimage"},"thumbnailUrl":"http:\/\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/talktalk-300x225.jpeg","keywords":["COBIT","cyber-attaque","cyber-crime","cyber-criminalit\u00e9","cyber-criminel","cyber-menace","cyber-r\u00e9silience","cyber-risque","cyber-s\u00e9curit\u00e9","cyber-terroriste","cybers\u00e9curit\u00e9","cyberterrorisme","gestion de la s\u00e9curit\u00e9","hacker","ISO 27001","ISO 27002","menace de s\u00e9curit\u00e9","piratage","pirate","pirate informatique","politique de s\u00e9curit\u00e9","resilia","s\u00e9curit\u00e9","s\u00e9curit\u00e9 de l'information","Talk Talk"],"articleSection":["cybers\u00e9curit\u00e9","S\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["http:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom#respond"]}]},{"@type":"Person","@id":"https:\/\/www.ab-consulting.fr\/blog\/#\/schema\/person\/56962e20fa3aaac4e03764204c57b25c","name":"Alain Bonneaud","image":{"@type":"ImageObject","@id":"https:\/\/www.ab-consulting.fr\/blog\/#personlogo","inLanguage":"fr-FR","url":"http:\/\/0.gravatar.com\/avatar\/6d901ed6d3a81ad26a0335a7dae96b4f?s=96&d=mm&r=g","contentUrl":"http:\/\/0.gravatar.com\/avatar\/6d901ed6d3a81ad26a0335a7dae96b4f?s=96&d=mm&r=g","caption":"Alain Bonneaud"},"sameAs":["http:\/\/www.ab-consulting.fr","https:\/\/twitter.com\/abonneaud"],"url":"http:\/\/www.ab-consulting.fr\/blog\/author\/abonneaud"}]}},"coauthors":[],"tax_additional":{"categories":{"linked":["<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\/cybersecurite-securite\" class=\"advgb-post-tax-term\">cybers\u00e9curit\u00e9<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">S\u00e9curit\u00e9<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">cybers\u00e9curit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">S\u00e9curit\u00e9<\/span>"]},"tags":{"linked":["<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">COBIT<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">cyber-attaque<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">cyber-crime<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">cyber-criminalit\u00e9<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">cyber-criminel<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">cyber-menace<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">cyber-r\u00e9silience<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">cyber-risque<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">cyber-s\u00e9curit\u00e9<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">cyber-terroriste<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">cybers\u00e9curit\u00e9<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">cyberterrorisme<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">gestion de la s\u00e9curit\u00e9<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">hacker<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">ISO 27001<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">ISO 27002<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">menace de s\u00e9curit\u00e9<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">piratage<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">pirate<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">pirate informatique<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">politique de s\u00e9curit\u00e9<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">resilia<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">s\u00e9curit\u00e9<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">s\u00e9curit\u00e9 de l&#039;information<\/a>","<a href=\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">Talk Talk<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">COBIT<\/span>","<span class=\"advgb-post-tax-term\">cyber-attaque<\/span>","<span class=\"advgb-post-tax-term\">cyber-crime<\/span>","<span class=\"advgb-post-tax-term\">cyber-criminalit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">cyber-criminel<\/span>","<span class=\"advgb-post-tax-term\">cyber-menace<\/span>","<span class=\"advgb-post-tax-term\">cyber-r\u00e9silience<\/span>","<span class=\"advgb-post-tax-term\">cyber-risque<\/span>","<span class=\"advgb-post-tax-term\">cyber-s\u00e9curit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">cyber-terroriste<\/span>","<span class=\"advgb-post-tax-term\">cybers\u00e9curit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">cyberterrorisme<\/span>","<span class=\"advgb-post-tax-term\">gestion de la s\u00e9curit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">hacker<\/span>","<span class=\"advgb-post-tax-term\">ISO 27001<\/span>","<span class=\"advgb-post-tax-term\">ISO 27002<\/span>","<span class=\"advgb-post-tax-term\">menace de s\u00e9curit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">piratage<\/span>","<span class=\"advgb-post-tax-term\">pirate<\/span>","<span class=\"advgb-post-tax-term\">pirate informatique<\/span>","<span class=\"advgb-post-tax-term\">politique de s\u00e9curit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">resilia<\/span>","<span class=\"advgb-post-tax-term\">s\u00e9curit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">s\u00e9curit\u00e9 de l&#039;information<\/span>","<span class=\"advgb-post-tax-term\">Talk Talk<\/span>"]}},"comment_count":"1","relative_dates":{"created":"Posted 11 ans ago","modified":"Updated 11 ans ago"},"absolute_dates":{"created":"Posted on 26 octobre 2015","modified":"Updated on 26 octobre 2015"},"absolute_dates_time":{"created":"Posted on 26 octobre 2015 13 h 25 min","modified":"Updated on 26 octobre 2015 13 h 47 min"},"featured_img_caption":"","jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p3OrbX-hy","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":665,"url":"http:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile","url_meta":{"origin":1088,"position":0},"title":"Un op\u00e9rateur mobile victime d&rsquo;une cyber-attaque","date":"6 octobre 2015","format":false,"excerpt":"Environ 15 millions de personnes qui se sont abonn\u00e9es dans les trois derni\u00e8res ann\u00e9es aux services sans fil de T-Mobile, quatri\u00e8me op\u00e9rateur de t\u00e9l\u00e9phonie mobile des Etats Unis avec 25 millions d'abonn\u00e9s, ont sans doute\u00a0\u00e9t\u00e9 victimes du vol de leurs informations personnelles suite \u00e0 une cyber-attaque r\u00e9ussie\u00a0contre l\u2019un de ses\u2026","rel":"","context":"Dans &quot;cybers\u00e9curit\u00e9&quot;","img":{"alt_text":"cyber-attaque contre T-Mobile","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cyber-attaque-T-mobile-300x200.jpeg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":766,"url":"http:\/\/www.ab-consulting.fr\/blog\/securite\/cyberterrorisme-menace-sous-estimee","url_meta":{"origin":1088,"position":1},"title":"Cyberterrorisme, une menace sous-estim\u00e9e","date":"8 octobre 2015","format":false,"excerpt":"De nombreux experts estiment que la premi\u00e8re cyber-guerre est d\u00e9j\u00e0 bien entam\u00e9e. Il ne s'agit\u00a0pas exactement une \u00abguerre froide\u00bb, au sens o\u00f9\u00a0la g\u00e9n\u00e9ration pr\u00e9c\u00e9dente l'entendait. Les dommages sont d\u00e9j\u00e0 consid\u00e9rables et s'\u00e9valuent\u00a0en milliards\u00a0de dollars et l'intention hostile des pirates, souvent parrain\u00e9s par les \u00c9tats, est \u00e9vidente.\u00a0Dans le m\u00eame temps, les\u2026","rel":"","context":"Dans &quot;Cyber-r\u00e9silience&quot;","img":{"alt_text":"cyberterrorisme","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cyberterrorisme-300x211.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1057,"url":"http:\/\/www.ab-consulting.fr\/blog\/securite\/10-trucs-sensibilisation-securite","url_meta":{"origin":1088,"position":2},"title":"10 cl\u00e9s pour une sensibilisation r\u00e9ussie sur la s\u00e9curit\u00e9","date":"24 octobre 2015","format":false,"excerpt":"Les cyber-menaces pesant sur\u00a0votre entreprise sont g\u00e9n\u00e9ralement imput\u00e9es \u00e0 des personnes \u00e9trang\u00e8res \u00e0 l'Organisation ou \u00e0 des programmeurs v\u00e9reux ins\u00e9rant, dans vos applications, du code malveillant con\u00e7u pour exploiter\u00a0les informations sensibles pour\u00a0votre Entreprise, voler\u00a0les donn\u00e9es\u00a0confidentielles de vos clients et \/ ou vous d\u00e9rober\u00a0de l'argent. Cependant, la menace de s\u00e9curit\u00e9 se\u2026","rel":"","context":"Dans &quot;S\u00e9curit\u00e9&quot;","img":{"alt_text":"S\u00e9curit\u00e9 menac\u00e9e de l'int\u00e9rieur","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/violation-s\u00e9curit\u00e9.jpeg?fit=424%2C283&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":10722,"url":"http:\/\/www.ab-consulting.fr\/blog\/securite\/risques-cyber-lenjeu-majeur-pour-les-entreprises","url_meta":{"origin":1088,"position":3},"title":"Risques cyber : l&rsquo;enjeu majeur pour les entreprises","date":"4 novembre 2019","format":false,"excerpt":"Le Forum Economique Mondial, dans son rapport 2019, a reconnu la cybercriminalit\u00e9 comme un risque majeur. Elle se situe dans le top 4 des risques les plus critiques. Au m\u00eame titre donc que les catastrophes naturelles et les effets du changement climatique.","rel":"","context":"Dans &quot;S\u00e9curit\u00e9&quot;","img":{"alt_text":"Risque cyber : Nouvel enjeu strat\u00e9gique des entreprises","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2019\/10\/cyber-risque-enjeu.jpg?fit=1200%2C677&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":6362,"url":"http:\/\/www.ab-consulting.fr\/blog\/securite\/facebook-pirate-probleme-cyber-hygiene","url_meta":{"origin":1088,"position":4},"title":"Facebook pirat\u00e9 : un probl\u00e8me de cyber-hygi\u00e8ne","date":"8 octobre 2018","format":false,"excerpt":"Le piratage de Facebook n'est qu'un des nombreux sympt\u00f4mes du probl\u00e8me. Nous ne devons pas attendre des fournisseurs de services qu'ils nous prot\u00e8gent. C'est le r\u00f4le des \u00e9tats qui \u00e9dictent r\u00e9guli\u00e8rement des lois et des r\u00e9glementations \u00e0 cet effet. Mais les premiers responsables sont les utilisateurs. En ce d\u00e9but de\u2026","rel":"","context":"Dans &quot;Cyber-r\u00e9silience&quot;","img":{"alt_text":"Facebook pirat\u00e9 : un probl\u00e8me de cyberhygi\u00e8ne de base","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2018\/10\/facebook-cyberhygiene.jpg?fit=1200%2C674&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1192,"url":"http:\/\/www.ab-consulting.fr\/blog\/geit\/cyber-risques-conseil-administration","url_meta":{"origin":1088,"position":5},"title":"Cyber-risques &#8211; Que fait le Conseil d&rsquo;Administration?","date":"30 octobre 2015","format":false,"excerpt":"Le Conseil d'Administration est en charge de s'assurer de la cr\u00e9ation de valeur pour les parties prenantes de l'Entreprise tout en optimisant les risques et les ressources. Le Conseil d'Administration, organe de Gouvernance de l'entreprise est donc directement concern\u00e9 par les cyber-risques. \"La SEC (organisme f\u00e9d\u00e9ral am\u00e9ricain en charge de\u2026","rel":"","context":"Dans &quot;cybers\u00e9curit\u00e9&quot;","img":{"alt_text":"Le conseil d'administration","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/conseil-administration-300x193.jpeg?resize=350%2C200","width":350,"height":200},"classes":[]}],"amp_enabled":true,"_links":{"self":[{"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/posts\/1088"}],"collection":[{"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/comments?post=1088"}],"version-history":[{"count":26,"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/posts\/1088\/revisions"}],"predecessor-version":[{"id":1121,"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/posts\/1088\/revisions\/1121"}],"wp:attachment":[{"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/media?parent=1088"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/categories?post=1088"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/tags?post=1088"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}