{"id":7707,"date":"2019-05-31T08:40:17","date_gmt":"2019-05-31T12:40:17","guid":{"rendered":"https:\/\/www.cscdigitalbrand.services\/blog\/?p=7707"},"modified":"2022-07-20T10:43:08","modified_gmt":"2022-07-20T14:43:08","slug":"dns-une-composante-fondamentale-trop-souvent-negligee-4e-partie","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-4e-partie\/","title":{"rendered":"DNS : Une composante fondamentale trop souvent n\u00e9glig\u00e9e, 4e Partie &#8211; La menace croissante des piratages DNS et du domain-shadowing"},"content":{"rendered":"\n<p><em>par Ken Linscott<\/em><\/p>\n\n\n\n<p>Dans ce billet, nous allons nous plonger dans les m\u00e9andres du piratage DNS \u2013 et du domain-shadowing \u2013 parce que ce type de cyberattaque est devenu r\u00e9cemment l\u2019un des plus r\u00e9guliers et destructeurs, le domain-shadowing utilisant une tactique similaire.<\/p>\n\n\n\n<p>D\u00e9but 2019, CSC s\u2019est joint \u00e0 la CISA (Cybersecurity and\nInfrastructure Security Agency) du D\u00e9partement am\u00e9ricain de la s\u00e9curit\u00e9\nint\u00e9rieure, ainsi qu\u2019\u00e0 d\u2019autres acteurs majeurs de la cybers\u00e9curit\u00e9&nbsp;\u2013 y\ncompris Cisco\u00ae Talos, FireEye\u00ae et Akamai&nbsp;\u2013 pour alerter les entreprises et\nle public face aux menaces croissantes des piratages DNS commandit\u00e9s par des\n\u00c9tats. <\/p>\n\n\n\n<p>Les cibles de ces attaques incluaient des entit\u00e9s\npubliques, des entreprises, des organismes de t\u00e9l\u00e9communication et des r\u00e9seaux\nd\u2019infrastructure, et ont entra\u00een\u00e9 des redirections de sites web et d\u2019e-mails en\nvue de recueillir des informations sensibles. <\/p>\n\n\n\n<p>Le piratage DNS permet \u00e0 une tierce\npartie de d\u00e9tourner les clients d\u2019une entreprise vers des sites web contrefaits\ndans le but de d\u00e9rober leurs identifiants et leurs donn\u00e9es confidentielles.\nC\u2019est non seulement un risque grave pesant sur les donn\u00e9es, mais \u00e9galement un\ncauchemar en termes de confidentialit\u00e9, notamment au regard des r\u00e9glementations\nplus s\u00e9v\u00e8res d\u00e9sormais en vigueur pour prot\u00e9ger la confidentialit\u00e9 des donn\u00e9es,\ncomme le R\u00e8glement g\u00e9n\u00e9ral sur la protection des donn\u00e9es (RGPD) au niveau\neurop\u00e9en. Les pirates de DNS peuvent \u00e9galement recueillir des informations \u00e0\npartir de la messagerie entrante de l\u2019entreprise, puis lancer des attaques de\nphishing sophistiqu\u00e9es sur ses clients et son personnel en utilisant les noms\nde domaine de l\u2019entreprise pour mieux dissimuler la supercherie. <\/p>\n\n\n\n<p>Trois vecteurs d\u2019attaque possibles sont utilis\u00e9s pour le\npiratage DNS.<\/p>\n\n\n\n<p><strong>1.\nAcc\u00e8s au portail de gestion des noms de domaine ou des serveurs DNS<\/strong><\/p>\n\n\n\n<p>La premi\u00e8re m\u00e9thode consiste \u00e0 profiter d\u2019une faiblesse\ndes contr\u00f4les d&#8217;acc\u00e8s ou des autorisations sur le portail de gestion des noms\nde domaine. Habituellement, un hacker parvient \u00e0 obtenir un nom d\u2019utilisateur et\nun mot de passe pour un portail de registrar qui n\u2019est pas prot\u00e9g\u00e9 par\nl\u2019authentification \u00e0 deux facteurs ou la validation&nbsp;IP, ce qui lui procure\nl\u2019acc\u00e8s n\u00e9cessaire pour modifier les serveurs de noms de domaine pour les noms\nde domaine accessibles gr\u00e2ce au compte, et lui permet donc de prendre le\ncontr\u00f4le du contenu.<\/p>\n\n\n\n<p><strong>2. Les syst\u00e8mes de\nnoms de domaine du registrar<\/strong><\/p>\n\n\n\n<p>La deuxi\u00e8me possibilit\u00e9 est celle d\u2019une vuln\u00e9rabilit\u00e9 au\nsein des syst\u00e8mes et des processus du registrar, qui permet l\u2019acc\u00e8s non\nautoris\u00e9. FireEye a r\u00e9cemment r\u00e9v\u00e9l\u00e9 un probl\u00e8me de domain-shadowing r\u00e9current\npour GoDaddy\u00ae, qui dure depuis 2016 et permet aux pirates d\u2019acc\u00e9der aux\nfichiers de zone des noms de domaine cibl\u00e9s et d\u2019y ajouter du contenu.<\/p>\n\n\n\n<p><strong>3. Le registre <\/strong><\/p>\n\n\n\n<p>Finalement, le registre lui-m\u00eame peut \u00eatre compromis. Un\nexemple fameux est l\u2019attaque d\u2019un registre br\u00e9silien en 2016, au cours duquel\n36&nbsp;noms de domaine bancaires ont \u00e9t\u00e9 d\u00e9tourn\u00e9s vers des sites parfaitement\ncontrefaits pendant six heures. Ces sites web frauduleux disposaient m\u00eame de\ncertificats num\u00e9riques valides \u00e9mis au nom de la banque, ce qui a permis de\ntromper les clients dont l\u2019ordinateur a \u00e9t\u00e9 infect\u00e9 par un malware dissimul\u00e9\ndans une fausse mise \u00e0 jour de plugin de s\u00e9curit\u00e9 de la banque pour les\nnavigateurs. Le malware, un v\u00e9ritable cheval de Troie, \u00e9tait con\u00e7u&nbsp;\u2013\nparadoxalement&nbsp;\u2013 pour d\u00e9sactiver les logiciels antivirus des ordinateurs.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/Slide9-FR-1024x576.jpg\" alt=\"\" class=\"wp-image-7708\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/05\/Slide9-FR-1024x576.jpg 1024w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/05\/Slide9-FR-300x169.jpg 300w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/05\/Slide9-FR-768x432.jpg 768w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2019\/05\/Slide9-FR.jpg 1117w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>On voit clairement qu\u2019il n\u2019existe aucune solution miracle\npour contrer la menace du piratage DNS. Il faut d\u00e9fendre trois zones\ndistinctes. En outre, il est essentiel d\u2019adopter une approche multi-niveaux.\nC\u2019est ce que nous appelons la \u00ab&nbsp;d\u00e9fense en profondeur&nbsp;\u00bb de la\ncybers\u00e9curit\u00e9&nbsp;: ajouter plusieurs niveaux de m\u00e9canisme de d\u00e9fense pour\nprot\u00e9ger les actifs num\u00e9riques et les donn\u00e9es en ligne, afin que, en cas de\nd\u00e9faillance de l\u2019un d\u2019entre eux, l\u2019autre puisse intervenir pour att\u00e9nuer\nl\u2019impact d\u2019une attaque.<\/p>\n\n\n\n<p><strong>Prochain billet<\/strong><\/p>\n\n\n\n<p>Dans notre prochain billet, nous vous pr\u00e9senterons une\nliste des meilleures pratiques recommand\u00e9es par CSC, diverses agences\ngouvernementales et l\u2019ICANN (Internet Corporation for Assigned Names and\nNumbers) pour limiter les risques de piratage DNS, ainsi que nos\nrecommandations pour pallier les 10&nbsp;vuln\u00e9rabilit\u00e9s DNS.<\/p>\n\n\n\n<p>Inscrivez-vous \u00e0 notre webinaire (en anglais), <a href=\"https:\/\/www.cscglobal.com\/service\/webinar\/DNS-Hijacking\/\"><em>DNS Hijacking: Security Learnings from the\nLatest Incidents<\/em><\/a>. <\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/email-sign-up\/\">Abonnez-vous \u00e0\nnotre blog pour recevoir les notifications de publication des nouveaux billets.<\/a>\n<\/p>\n\n\n\n<p><strong>D\u2019autres billets de la s\u00e9rie&nbsp;:<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-1e-partie\/\">&lt;&lt;&nbsp;1e Partie &#8211; Qu\u2019est-ce que le DNS et pourquoi est-il vuln\u00e9rable&nbsp;?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-2e-partie\/\">&lt;&lt;&nbsp;2e Partie &#8211; Les quatre vuln\u00e9rabilit\u00e9s DNS que vous devez conna\u00eetre<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-3e-partie\/\">&lt;&lt; 3e Partie &#8211; Six vuln\u00e9rabilit\u00e9s DNS suppl\u00e9mentaires qui rendent la s\u00e9curit\u00e9 essentielle <\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-5e-partie\/\">&gt;&gt;\n5e Partie &#8211; Att\u00e9nuer les risques de 10 vuln\u00e9rabilit\u00e9s DNS importantes<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>par Ken Linscott Dans ce billet, nous allons nous plonger dans les m\u00e9andres du piratage DNS \u2013 et du domain-shadowing \u2013 parce que ce type de cyberattaque est devenu r\u00e9cemment l\u2019un des plus r\u00e9guliers et destructeurs, le domain-shadowing utilisant une tactique similaire. D\u00e9but 2019, CSC s\u2019est joint \u00e0 la CISA (Cybersecurity and Infrastructure Security Agency) [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[545],"tags":[],"class_list":["post-7707","post","type-post","status-publish","format-standard","hentry","category-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DNS : Une composante fondamentale trop souvent n\u00e9glig\u00e9e, 4e Partie - La menace croissante des piratages DNS et du domain-shadowing | CSC<\/title>\n<meta name=\"description\" content=\"par Ken Linscott Dans ce billet, nous allons nous plonger dans les m\u00e9andres du piratage DNS \u2013 et du domain-shadowing \u2013 parce que ce type de cyberattaque\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-4e-partie\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DNS : Une composante fondamentale trop souvent n\u00e9glig\u00e9e, 4e Partie - La menace croissante des piratages DNS et du domain-shadowing | CSC\" \/>\n<meta property=\"og:description\" content=\"par Ken Linscott Dans ce billet, nous allons nous plonger dans les m\u00e9andres du piratage DNS \u2013 et du domain-shadowing \u2013 parce que ce type de cyberattaque\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-4e-partie\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-31T12:40:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-20T14:43:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/Slide9-FR-1024x576.jpg\" \/>\n<meta name=\"author\" content=\"Digital Brand Services Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Digital Brand Services Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-une-composante-fondamentale-trop-souvent-negligee-4e-partie\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-une-composante-fondamentale-trop-souvent-negligee-4e-partie\\\/\"},\"author\":{\"name\":\"Digital Brand Services Marketing\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\"},\"headline\":\"DNS : Une composante fondamentale trop souvent n\u00e9glig\u00e9e, 4e Partie &#8211; La menace croissante des piratages DNS et du domain-shadowing\",\"datePublished\":\"2019-05-31T12:40:17+00:00\",\"dateModified\":\"2022-07-20T14:43:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-une-composante-fondamentale-trop-souvent-negligee-4e-partie\\\/\"},\"wordCount\":880,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-une-composante-fondamentale-trop-souvent-negligee-4e-partie\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Slide9-FR-1024x576.jpg\",\"articleSection\":[\"Fran\u00e7ais\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-une-composante-fondamentale-trop-souvent-negligee-4e-partie\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-une-composante-fondamentale-trop-souvent-negligee-4e-partie\\\/\",\"name\":\"DNS : Une composante fondamentale trop souvent n\u00e9glig\u00e9e, 4e Partie - La menace croissante des piratages DNS et du domain-shadowing | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-une-composante-fondamentale-trop-souvent-negligee-4e-partie\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-une-composante-fondamentale-trop-souvent-negligee-4e-partie\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Slide9-FR-1024x576.jpg\",\"datePublished\":\"2019-05-31T12:40:17+00:00\",\"dateModified\":\"2022-07-20T14:43:08+00:00\",\"description\":\"par Ken Linscott Dans ce billet, nous allons nous plonger dans les m\u00e9andres du piratage DNS \u2013 et du domain-shadowing \u2013 parce que ce type de cyberattaque\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-une-composante-fondamentale-trop-souvent-negligee-4e-partie\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-une-composante-fondamentale-trop-souvent-negligee-4e-partie\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-une-composante-fondamentale-trop-souvent-negligee-4e-partie\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Slide9-FR-1024x576.jpg\",\"contentUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Slide9-FR-1024x576.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/dns-une-composante-fondamentale-trop-souvent-negligee-4e-partie\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DNS : Une composante fondamentale trop souvent n\u00e9glig\u00e9e, 4e Partie &#8211; La menace croissante des piratages DNS et du domain-shadowing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\",\"name\":\"Digital Brand Services Marketing\",\"sameAs\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DNS : Une composante fondamentale trop souvent n\u00e9glig\u00e9e, 4e Partie - La menace croissante des piratages DNS et du domain-shadowing | CSC","description":"par Ken Linscott Dans ce billet, nous allons nous plonger dans les m\u00e9andres du piratage DNS \u2013 et du domain-shadowing \u2013 parce que ce type de cyberattaque","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-4e-partie\/","og_locale":"en_US","og_type":"article","og_title":"DNS : Une composante fondamentale trop souvent n\u00e9glig\u00e9e, 4e Partie - La menace croissante des piratages DNS et du domain-shadowing | CSC","og_description":"par Ken Linscott Dans ce billet, nous allons nous plonger dans les m\u00e9andres du piratage DNS \u2013 et du domain-shadowing \u2013 parce que ce type de cyberattaque","og_url":"https:\/\/www.cscdbs.com\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-4e-partie\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2019-05-31T12:40:17+00:00","article_modified_time":"2022-07-20T14:43:08+00:00","og_image":[{"url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/Slide9-FR-1024x576.jpg","type":"","width":"","height":""}],"author":"Digital Brand Services Marketing","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Digital Brand Services Marketing","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-4e-partie\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-4e-partie\/"},"author":{"name":"Digital Brand Services Marketing","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d"},"headline":"DNS : Une composante fondamentale trop souvent n\u00e9glig\u00e9e, 4e Partie &#8211; La menace croissante des piratages DNS et du domain-shadowing","datePublished":"2019-05-31T12:40:17+00:00","dateModified":"2022-07-20T14:43:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-4e-partie\/"},"wordCount":880,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-4e-partie\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/Slide9-FR-1024x576.jpg","articleSection":["Fran\u00e7ais"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-4e-partie\/","url":"https:\/\/www.cscdbs.com\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-4e-partie\/","name":"DNS : Une composante fondamentale trop souvent n\u00e9glig\u00e9e, 4e Partie - La menace croissante des piratages DNS et du domain-shadowing | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-4e-partie\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-4e-partie\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/Slide9-FR-1024x576.jpg","datePublished":"2019-05-31T12:40:17+00:00","dateModified":"2022-07-20T14:43:08+00:00","description":"par Ken Linscott Dans ce billet, nous allons nous plonger dans les m\u00e9andres du piratage DNS \u2013 et du domain-shadowing \u2013 parce que ce type de cyberattaque","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-4e-partie\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-4e-partie\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-4e-partie\/#primaryimage","url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/Slide9-FR-1024x576.jpg","contentUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2019\/05\/Slide9-FR-1024x576.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/dns-une-composante-fondamentale-trop-souvent-negligee-4e-partie\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"DNS : Une composante fondamentale trop souvent n\u00e9glig\u00e9e, 4e Partie &#8211; La menace croissante des piratages DNS et du domain-shadowing"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d","name":"Digital Brand Services Marketing","sameAs":["https:\/\/www.cscdbs.com\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/7707","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=7707"}],"version-history":[{"count":3,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/7707\/revisions"}],"predecessor-version":[{"id":7779,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/7707\/revisions\/7779"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=7707"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=7707"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=7707"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}