{"id":184250,"date":"2020-05-14T13:00:06","date_gmt":"2020-05-14T12:00:06","guid":{"rendered":"https:\/\/www.stormshield.com\/?p=184250"},"modified":"2023-06-23T16:15:38","modified_gmt":"2023-06-23T15:15:38","slug":"industrie-manufacturiere-menace-cyber","status":"publish","type":"post","link":"https:\/\/www.stormshield.com\/fr\/actus\/industrie-manufacturiere-menace-cyber\/","title":{"rendered":"L\u2019industrie manufacturi\u00e8re \u00e0 l\u2019\u00e9preuve de la menace cyber"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-184241\" title=\"De SasinTipchai. Image utilis\u00e9e sous licence de Shutterstock.com\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_115846333-1024x647.jpg\" alt=\"L\u2019industrie manufacturi\u00e8re \u00e0 l\u2019\u00e9preuve des cyberattaques | Stormshield\" width=\"800\" height=\"505\" srcset=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_115846333-1024x647.jpg 1024w, https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_115846333-300x189.jpg 300w, https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_115846333-768x485.jpg 768w, https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_115846333-1536x970.jpg 1536w, https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_115846333-2048x1293.jpg 2048w, https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_115846333-1396x881.jpg 1396w, https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_115846333-700x442.jpg 700w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<p><strong>La d\u00e9couverte de nouveaux ransomwares, sp\u00e9cialement con\u00e7us pour attaquer les r\u00e9seaux op\u00e9rationnels, marque un tournant dans les cyberattaques industrielles. En visant directement l'industrie manufacturi\u00e8re et ses lignes de production, ces logiciels malveillants d\u00e9placent les fronti\u00e8res de la s\u00e9curit\u00e9 num\u00e9rique des groupes industriels en les attaquant en plein c\u0153ur. Et si la d\u00e9stabilisation des lignes de production \u00e9tait la nouvelle marotte des cyber-attaquants ?<\/strong><\/p>\n<p>La nouvelle est arriv\u00e9e par un tweet. Le 6\u00a0janvier\u00a02020, le chercheur <strong>Vitali Kremez<\/strong>, du groupe Malware Hunter Team annon\u00e7ait la d\u00e9couverte de Snake (ou Ekans), un ransomware capable de neutraliser les r\u00e9seaux industriels et de paralyser les lignes de production.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">2020-01-06: \ud83c\udd95\ud83d\udd12<a href=\"https:\/\/twitter.com\/hashtag\/Golang?src=hash&amp;ref_src=twsrc%5Etfw\">#Golang<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/Ransomware?src=hash&amp;ref_src=twsrc%5Etfw\">#Ransomware<\/a> \"<a href=\"https:\/\/twitter.com\/hashtag\/EKANS?src=hash&amp;ref_src=twsrc%5Etfw\">#EKANS<\/a>\" aka \"<a href=\"https:\/\/twitter.com\/hashtag\/SNAKE?src=hash&amp;ref_src=twsrc%5Etfw\">#SNAKE<\/a>\"\ud83d\udc0d<br \/>\n\ud83c\udfafTargeted Ransomware|\"We breached your corporate network...\"<br \/>\nStr-&gt;'FileName'-&gt;'IV'-&gt;'ENCRYPTED_AES_Key'-&gt;'EKANS' Marker<br \/>\nPath:<br \/>\n\ud83d\udc7eC:\/Users\/WIN1\/go\/src\/...\/crypt.go<br \/>\nh\/t <a href=\"https:\/\/twitter.com\/malwrhunterteam?ref_src=twsrc%5Etfw\">@malwrhunterteam<\/a> cc <a href=\"https:\/\/twitter.com\/demonslay335?ref_src=twsrc%5Etfw\">@demonslay335<\/a> <a href=\"https:\/\/twitter.com\/BleepinComputer?ref_src=twsrc%5Etfw\">@BleepinComputer<\/a> <a href=\"https:\/\/t.co\/mnf4fhYlD4\">pic.twitter.com\/mnf4fhYlD4<\/a><\/p>\n<p>\u2014 Vitali Kremez (@VK_Intel) <a href=\"https:\/\/twitter.com\/VK_Intel\/status\/1214333066245812224?ref_src=twsrc%5Etfw\">January 6, 2020<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><br \/>\nUne information qui a vite agit\u00e9 la communaut\u00e9 cyber. Pourtant Snake n\u2019est pas tout \u00e0 fait le premier ransomware \u00e0 viser le r\u00e9seau OT, rappelle le chercheur <strong>David Grout<\/strong> dans les colonnes de <em><a href=\"https:\/\/www.industrie-techno.com\/article\/pourquoi-le-ransomware-snake-marque-un-tournant-dans-les-cyberattaques-industrielles.59134\" target=\"_blank\" rel=\"noopener noreferrer\">Industries Techno<\/a><\/em>. En effet en 2019 d\u00e9j\u00e0, <a href=\"https:\/\/www.lemondeinformatique.fr\/actualites\/lire-norsk-hydro-frappe-par-une-cyberattaque-massive-74699.html\" target=\"_blank\" rel=\"noopener noreferrer\">le ransomware LockerGoga<\/a> avait caus\u00e9 des d\u00e9g\u00e2ts importants notamment chez le producteur d\u2019aluminium norv\u00e9gien Norsk Hydro \u2013 mettant en p\u00e9ril leur activit\u00e9 op\u00e9rationnelle, avec pour cons\u00e9quences d\u2019importantes pertes financi\u00e8res. Mais pourquoi parle-t-on autant de Snake alors\u00a0? Notamment parce que ce ransomware serait capable d\u2019attaquer encore plus de services utilis\u00e9s uniquement dans les r\u00e9seaux industriels. Alors que le nombre de cyberattaques, et leur complexit\u00e9, va croissant, <strong>doit-on s\u2019attendre \u00e0 ce que la production industrielle soit d\u00e9sormais une cible de choix pour les cyber-attaquants ?<\/strong> Apr\u00e8s Industroyer et <a href=\"https:\/\/www.stormshield.com\/fr\/actus\/stuxnet-ver-informatique-enseignements-heritage\/\">Stuxnet<\/a>, le cas de Snake marque-t-il un nouveau tournant pour la cybers\u00e9curit\u00e9 des syst\u00e8mes industriels ?<\/p>\n<p>&nbsp;<\/p>\n<h2>Manufacturing et contexte industriel<\/h2>\n<p>Le manufacturing est un secteur sensible, avec des sp\u00e9cificit\u00e9s qui sont autant de vuln\u00e9rabilit\u00e9s potentielles. Le premier d\u00e9fi concerne la dur\u00e9e de vie des \u00e9quipements qui sont con\u00e7us pour vivre en moyenne vingt ans. Sur la plupart des sites industriels, \u00ab\u00a0<em>on fait donc cohabiter des infrastructures qui sont plus ou moins anciennes, avec des architectures r\u00e9seau et des syst\u00e8mes d\u2019exploitation plus ou moins r\u00e9cents, qui n\u2019int\u00e8grent pas forc\u00e9ment des normes de s\u00e9curit\u00e9 avanc\u00e9es car les \u00e9volutions sont co\u00fbteuses<\/em>\u00a0\u00bb, souligne <strong>Vincent Riondet<\/strong>, Responsable des \u00e9quipes Projets et Services Cybers\u00e9curit\u00e9 de Schneider Electric France. C\u2019est le cas par exemple avec les postes informatiques d\u00e9di\u00e9s au contr\u00f4le commande des machines\u00a0: ils op\u00e8rent souvent <a href=\"https:\/\/www.stormshield.com\/fr\/actus\/mais-qui-utilise-encore-internet-explorer-aujourdhui\/\">sur des OS Windows tr\u00e8s anciens<\/a>, et historiquement pas connect\u00e9s aux r\u00e9seaux Internet. \u00ab\u00a0<em>Les syst\u00e8mes d\u2019exploitation install\u00e9s sur de nombreux syst\u00e8mes de contr\u00f4le dans les usines sont potentiellement p\u00e9rim\u00e9s, difficiles \u00e0 \u00e9changer ou alors, leur configuration ultra personnalis\u00e9e se r\u00e9v\u00e8le incompatible avec les offres de s\u00e9curit\u00e9 standard des \u00e9quipes IT<\/em>\u00a0\u00bb, compl\u00e8te le chercheur <strong>Nisarg Desai<\/strong> <a href=\"https:\/\/www.globalsign.fr\/fr\/blog\/it-vs-ot-internet-industriel\/\" target=\"_blank\" rel=\"noopener noreferrer\">dans un article de blog<\/a>.<\/p>\n<blockquote><p><em>On fait donc cohabiter des infrastructures qui sont plus ou moins anciennes, avec des architectures r\u00e9seau et des syst\u00e8mes d\u2019exploitation plus ou moins r\u00e9cents, qui n\u2019int\u00e8grent pas forc\u00e9ment des normes de s\u00e9curit\u00e9 avanc\u00e9es car les \u00e9volutions sont co\u00fbteuses<\/em><\/p>\n<pre><strong>Vincent Riondet,<\/strong> Responsable des \u00e9quipes Projets et Services Cybers\u00e9curit\u00e9 de Schneider Electric France<\/pre>\n<\/blockquote>\n<p>Autre d\u00e9fi\u00a0: le manque d\u2019homog\u00e9n\u00e9it\u00e9 entre les fournisseurs d\u2019\u00e9quipements, de logiciels de contr\u00f4le et des composants. Tous ne r\u00e9pondent pas aux m\u00eames exigences, normes ou conditions de cr\u00e9ation, de contr\u00f4les et autres\u2026 Une seule faille ou une seule backdoor peut alors entra\u00eener la chute de l\u2019int\u00e9gralit\u00e9 de la cha\u00eene de production. Parce que ces cha\u00eenes de production sont souvent complexes et font appel \u00e0 des acteurs qui ne communiquent pas entre eux, elles peuvent \u00eatre particuli\u00e8rement vuln\u00e9rables \u00e0 ces attaques externes. Et pour complexifier encore le tableau, certaines op\u00e9rations de maintenance peuvent \u00eatre ex\u00e9cut\u00e9es par des intervenants ext\u00e9rieurs, qui ont souvent recours \u00e0 des m\u00e9dias USB <a href=\"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-a-point-devriez-peur-de-machine-a-cafe\/\" target=\"_blank\" rel=\"noopener noreferrer\">pour mettre \u00e0 jour ou configurer des \u00e9quipements<\/a>. L\u00e0 encore, ce type d\u2019intervention est susceptible d\u2019\u00eatre un vecteur de cyberattaques car, dans la plupart des cas, les serveurs ne sont pas prot\u00e9g\u00e9s.<\/p>\n<p>Enfin, comme le reste du monde de l\u2019industrie, la cha\u00eene de production qui s\u2019est longtemps consid\u00e9r\u00e9e comme un syst\u00e8me isol\u00e9 l\u2019est de moins en moins. Derri\u00e8re le terme de convergence IT-OT, se cache la connectivit\u00e9 des r\u00e9seaux OT et ainsi l\u2019un des principaux canaux d\u2019infection. Du fait de cette connectivit\u00e9, la cha\u00eene de production fait d\u00e9sormais face \u00e0 de nouveaux risques cyber, d\u00e9j\u00e0 bien connus dans le monde de l\u2019IT.<\/p>\n<p>&nbsp;<\/p>\n<h2>Des risques propres au manufacturing<\/h2>\n<p>De la supply chain aux r\u00e9seaux, l\u2019\u00e9tendue de la menace cyber sur l\u2019univers du manufacturing s\u2019est ainsi consid\u00e9rablement \u00e9largie ces derni\u00e8res ann\u00e9es. Avec, en ligne de mire, des effets potentiellement d\u00e9vastateurs. L\u2019industriel danois Demant, qui fabrique notamment des appareils auditifs, a par exemple fait l\u2019exp\u00e9rience d\u2019un blocage de ses cha\u00eenes d\u2019assemblage en septembre 2019. <strong>Co\u00fbt estim\u00e9 de l\u2019impact du ransomware\u00a0?<\/strong> Plus de 95\u00a0millions de dollars. La plupart des pertes proviennent des contrats de vente perdus et de l\u2019incapacit\u00e9 de la soci\u00e9t\u00e9 \u00e0 honorer ses commandes, <a href=\"https:\/\/www.zdnet.fr\/actualites\/ransomware-une-entreprise-danoise-estime-les-degats-a-95-millions-de-dollars-39891429.htm\" target=\"_blank\" rel=\"noopener noreferrer\">a pr\u00e9cis\u00e9 l\u2019entreprise<\/a>.<\/p>\n<p>On peut facilement imaginer qu\u2019une attaque cibl\u00e9e, sur des OS d\u00e9faillants par exemple, permette <a href=\"https:\/\/www.stormshield.com\/fr\/actus\/industrie-agroalimentaire-nouvelle-cible-cyberattaques\/\">de compromettre les contr\u00f4les-commandes de plusieurs entreprises de l\u2019agro-alimentaire<\/a> ou de la pharmacie, et conduisent \u00e0 la fabrication de produits d\u00e9fectueux. Ce qui ferait courir <strong>un risque majeur pour ces industriels<\/strong>, tenus d\u2019assurer une tra\u00e7abilit\u00e9 compl\u00e8te de leurs produits dans le cadre du contr\u00f4le qualit\u00e9. Les risques d\u2019espionnage industriel via des attaques cibl\u00e9es sont \u00e9galement importants. Et enfin, n\u2019occultons pas le fait que certaines cyberattaques sur les lignes de production peuvent conduire d\u2019une part \u00e0 mettre en danger physique les op\u00e9rateurs eux-m\u00eames, et d\u2019autre part \u00e0 provoquer de graves incidents environnementaux.<\/p>\n<p>Pour comprendre l\u2019int\u00e9r\u00eat des cyber-attaquants pour le manufacturing, il est obligatoire de mentionner le mod\u00e8le \u00e9conomique de ces industriels. Car outre la promesse de retomb\u00e9es m\u00e9diatiques importantes en cas de perturbations durables, c\u2019est surtout l\u2019app\u00e2t du gain qui semble motiver les cyber-attaquants. En effet, des lignes de production \u00e0 l\u2019arr\u00eat sont synonymes d\u2019autant de pertes s\u00e8ches pour les entreprises ; un \u00e9l\u00e9ment qui peut rendre ces industriels plus prompts \u00e0 payer les ran\u00e7ons. Sans assurance pour autant de r\u00e9cup\u00e9rer quoi que ce soit.<\/p>\n<p>&nbsp;<\/p>\n<h2>Industrie 4.0, extension du domaine de l\u2019attaque<\/h2>\n<p><a href=\"https:\/\/www.stormshield.com\/fr\/actus\/quels-defis-cyber-doit-relever-lindustrie-en-2019\/\">Nous l\u2019\u00e9crivions d\u00e9j\u00e0 en 2018<\/a>. \u00c0 l\u2019heure de l\u2019industrie du futur, le d\u00e9veloppement de l'internet industriel des objets (IIoT), de la num\u00e9risation des usines et des technologies d\u2019intelligence artificielle rend les r\u00e9seaux OT de plus en plus connect\u00e9s et communicants, notamment vers les r\u00e9seaux IT. Mais cette hyper-connexion les expose toujours plus aux menaces cyber. \u00ab\u00a0<em>D\u2019autant que les r\u00e9seaux OT n\u2019ont souvent pas de barri\u00e8re r\u00e9seau ou de barri\u00e8re endpoint<\/em>\u00a0\u00bb, abonde Vincent Riondet. <a href=\"https:\/\/www.stormshield.com\/fr\/actus\/cybersecurite-industrielle-pourquoi-faut-il-arreter-de-parler-de-scada\/\">Les multiples composantes de l\u2019OT<\/a> sont donc autant de points d\u2019entr\u00e9e possibles, notamment parce que la convergence entre IT et OT est encore largement d\u00e9licate \u2013 voire inop\u00e9rante dans certains cas.<\/p>\n<p>\u00ab\u00a0<em>Avec l\u2019industrie 4.0, les points d\u2019acc\u00e8s se sont multipli\u00e9s, \u00e0 la faveur d\u2019une demande d\u2019interconnexion qui a \u00e9t\u00e9 ex\u00e9cut\u00e9e sans r\u00e9elle r\u00e9flexion sur le security-by-design<\/em>\u00a0\u00bb, enrichit Vincent Riondet. L\u2019arriv\u00e9e de l\u2019IoT industriel, comme l\u2019int\u00e9gration de commandes automatiques ou l\u2019arriv\u00e9e de la r\u00e9alit\u00e9 augment\u00e9e et virtuelle, a ouvert de nouvelles failles. En mai 2017, un autre acteur de la cybers\u00e9curit\u00e9, en collaboration avec l\u2019\u00c9cole polytechnique de Milan, d\u00e9montrait qu\u2019il \u00e9tait possible <a href=\"https:\/\/www.maddyness.com\/2017\/06\/06\/cybersecurite-piratage-robots-catastrophe-industrielle\/\" target=\"_blank\" rel=\"noopener noreferrer\">de prendre le contr\u00f4le total du robot<\/a>, d\u2019y installer un logiciel malveillant capable de le \u00ab reprogrammer \u00bb.<\/p>\n<p>&nbsp;<\/p>\n<h2>Assurer l\u2019int\u00e9grit\u00e9 de la branche OT<\/h2>\n<p>Comment les entreprises du secteur font-elles face \u00e0 ces nouvelles menaces, qui marquent <strong>un tournant dans le monde de la cybers\u00e9curit\u00e9 industrielle<\/strong>\u00a0? Pour le moment, les efforts en mati\u00e8re de cybers\u00e9curit\u00e9 du p\u00e9rim\u00e8tre manufacturing sont pour le moins h\u00e9t\u00e9rog\u00e8nes. \u00ab\u00a0<em>Le renforcement de la s\u00e9curit\u00e9 de la branche OT doit d\u2019abord passer par une s\u00e9curisation accrue des OS des \u00e9quipements r\u00e9seaux<\/em>\u00a0\u00bb, rel\u00e8ve Vincent Riondet. Mais en parall\u00e8le, l\u2019un des grands enjeux de la s\u00e9curit\u00e9 des infrastructures manufacturing concerne la ma\u00eetrise des communications r\u00e9seau.<\/p>\n<p>Chiffrer toutes les communications entre les machines est ainsi une \u00e9tape suppl\u00e9mentaire vers plus de s\u00e9curit\u00e9. \u00ab\u00a0<em>En compl\u00e9ment d\u2019une segmentation du r\u00e9seau appropri\u00e9e, il est possible d\u2019agir sur la s\u00e9curisation des \u00e9changes, en garantissant la confidentialit\u00e9 et l\u2019int\u00e9grit\u00e9 des donn\u00e9es<\/em>\u00a0\u00bb, rapporte quant \u00e0 lui <strong>Vincent Seruch<\/strong>, ICS Security Team Leader d\u2019<a href=\"https:\/\/airbus-cyber-security.com\/fr\/\" target=\"_blank\" rel=\"noopener noreferrer\">Airbus CyberSecurity<\/a>. \u00ab\u00a0<em>Il faut alors de cartographier l\u2019ensemble des communications sur les r\u00e9seaux OT puis de les chiffrer, gr\u00e2ce \u00e0 des m\u00e9thodes cryptographiques. Mais cela doit aussi se faire en prenant en compte les besoin d\u2019inspection des \u00e9changes.<\/em>\u00a0\u00bb La t\u00e9l\u00e9maintenance est une autre opportunit\u00e9\u00a0; effectuer les mises \u00e0 jour \u00e0 distance permet d\u2019une part de se passer de m\u00e9dias USB potentiellement douteux et d\u2019autre part de limiter les risques d\u2019erreurs inh\u00e9rents aux changements d\u2019op\u00e9rateurs trop fr\u00e9quents. R\u00e9sultat\u00a0: une meilleure efficience des mises \u00e0 jour, \u00e0 condition de s\u00e9curiser \u00e9galement les acc\u00e8s \u00e0 cette t\u00e9l\u00e9maintenance.<\/p>\n<p>&nbsp;<\/p>\n<p>La crise sanitaire du Covid-19 pose aujourd\u2019hui la question de la souverainet\u00e9 industrielle et de la relocalisation en France de certaines usines dans des secteurs strat\u00e9giques. La mise en \u0153uvre d\u2019un tel plan pourrait alors servir de test grandeur nature, dans la mesure o\u00f9 cette \u00ab\u00a0d\u00e9globalisation industrielle\u00a0\u00bb s\u2019accompagnerait d\u2019une automatisation accrue. La branche OT ne s\u2019en trouverait que plus expos\u00e9e. Gageons que d\u2019ici l\u00e0, la cybers\u00e9curit\u00e9 industrielle sera, elle aussi, sur le devant de la sc\u00e8ne.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La d\u00e9couverte de nouveaux ransomwares, sp\u00e9cialement con\u00e7us pour attaquer les r\u00e9seaux op\u00e9rationnels, marque un tournant dans les cyberattaques industrielles. En visant directement l&rsquo;industrie manufacturi\u00e8re et ses lignes de production, ces logiciels malveillants d\u00e9placent les fronti\u00e8res de la s\u00e9curit\u00e9 num\u00e9rique des groupes industriels en les attaquant&#8230;<\/p>\n","protected":false},"author":48,"featured_media":184241,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1612],"tags":[6564,4368],"business_size":[682,683,681],"industry":[699,697],"help_mefind":[],"features":[],"type_security":[],"maintenance":[],"offer":[],"administration_tools":[],"cloud_offers":[],"listing_product":[1595,6567,1552,1565,1530],"class_list":["post-184250","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-veille-securite","tag-cybersecurite-industrielle","tag-la-cybersecurite-par-stormshield","business_size-eti","business_size-grande-entreprise","business_size-pme","industry-industrie-fr","industry-sante-et-etablissements-de-soin","listing_product-breach-fighter-fr","listing_product-sni20-fr","listing_product-sni40-fr","listing_product-ses-fr","listing_product-sns-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>L\u2019industrie manufacturi\u00e8re \u00e0 l\u2019\u00e9preuve des cyberattaques | Stormshield<\/title>\n<meta name=\"description\" content=\"Les nouveaux ransomwares, sp\u00e9cialement con\u00e7us pour attaquer les r\u00e9seaux OT, marquent un tournant dans les cyberattaques industrielles. D\u00e9cryptage.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stormshield.com\/fr\/actus\/industrie-manufacturiere-menace-cyber\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"L\u2019industrie manufacturi\u00e8re \u00e0 l\u2019\u00e9preuve des cyberattaques | Stormshield\" \/>\n<meta property=\"og:description\" content=\"Les nouveaux ransomwares, sp\u00e9cialement con\u00e7us pour attaquer les r\u00e9seaux OT, marquent un tournant dans les cyberattaques industrielles. D\u00e9cryptage.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stormshield.com\/fr\/actus\/industrie-manufacturiere-menace-cyber\/\" \/>\n<meta property=\"og:site_name\" content=\"Stormshield\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-14T12:00:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-23T15:15:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_115846333-1024x647.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"647\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Khobeib Ben Boubaker\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:site\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Khobeib Ben Boubaker\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/industrie-manufacturiere-menace-cyber\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/industrie-manufacturiere-menace-cyber\\\/\"},\"author\":{\"name\":\"Khobeib Ben Boubaker\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/5994c276aef6b25198c1d0863a392be1\"},\"headline\":\"L\u2019industrie manufacturi\u00e8re \u00e0 l\u2019\u00e9preuve de la menace cyber\",\"datePublished\":\"2020-05-14T12:00:06+00:00\",\"dateModified\":\"2023-06-23T15:15:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/industrie-manufacturiere-menace-cyber\\\/\"},\"wordCount\":1773,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/industrie-manufacturiere-menace-cyber\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_115846333.jpg\",\"keywords\":[\"Cybers\u00e9curit\u00e9 industrielle\",\"La cybers\u00e9curit\u00e9 - par Stormshield\"],\"articleSection\":[\"Veille s\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/industrie-manufacturiere-menace-cyber\\\/\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/industrie-manufacturiere-menace-cyber\\\/\",\"name\":\"L\u2019industrie manufacturi\u00e8re \u00e0 l\u2019\u00e9preuve des cyberattaques | Stormshield\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/industrie-manufacturiere-menace-cyber\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/industrie-manufacturiere-menace-cyber\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_115846333.jpg\",\"datePublished\":\"2020-05-14T12:00:06+00:00\",\"dateModified\":\"2023-06-23T15:15:38+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/5994c276aef6b25198c1d0863a392be1\"},\"description\":\"Les nouveaux ransomwares, sp\u00e9cialement con\u00e7us pour attaquer les r\u00e9seaux OT, marquent un tournant dans les cyberattaques industrielles. D\u00e9cryptage.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/industrie-manufacturiere-menace-cyber\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/industrie-manufacturiere-menace-cyber\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/industrie-manufacturiere-menace-cyber\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_115846333.jpg\",\"contentUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_115846333.jpg\",\"width\":2560,\"height\":1616},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/industrie-manufacturiere-menace-cyber\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"L\u2019industrie manufacturi\u00e8re \u00e0 l\u2019\u00e9preuve de la menace cyber\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/\",\"name\":\"Stormshield\",\"description\":\"Stormshield\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/5994c276aef6b25198c1d0863a392be1\",\"name\":\"Khobeib Ben Boubaker\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9320764755f6fe5087f97f8d94a52f55f475795768fd06e5e0695d741066aacf?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9320764755f6fe5087f97f8d94a52f55f475795768fd06e5e0695d741066aacf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9320764755f6fe5087f97f8d94a52f55f475795768fd06e5e0695d741066aacf?s=96&d=mm&r=g\",\"caption\":\"Khobeib Ben Boubaker\"},\"description\":\"A graduate of CESI engineering school and holder of an ESCP Europe MBA, Khobeib began his career at Alcatel Lucent in the Submarine Network entity. His first love was the design of fibre optic systems for intercommunication between countries and operators. R&amp;D engineer, international trainer, business engineer, then Business Unit Director: Khobeib wore many technical and business hats for a decade before coming to Stormshield. And following an initial post as Business Developer for the industrial security offering, he is now at Head of DMI (Defence, Ministries, Industry) Business Line to support the company's strategic ambitions for IT\\\/OT cybersecurity.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/khobeib-benboubaker-14598061\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"L\u2019industrie manufacturi\u00e8re \u00e0 l\u2019\u00e9preuve des cyberattaques | Stormshield","description":"Les nouveaux ransomwares, sp\u00e9cialement con\u00e7us pour attaquer les r\u00e9seaux OT, marquent un tournant dans les cyberattaques industrielles. D\u00e9cryptage.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stormshield.com\/fr\/actus\/industrie-manufacturiere-menace-cyber\/","og_locale":"fr_FR","og_type":"article","og_title":"L\u2019industrie manufacturi\u00e8re \u00e0 l\u2019\u00e9preuve des cyberattaques | Stormshield","og_description":"Les nouveaux ransomwares, sp\u00e9cialement con\u00e7us pour attaquer les r\u00e9seaux OT, marquent un tournant dans les cyberattaques industrielles. D\u00e9cryptage.","og_url":"https:\/\/www.stormshield.com\/fr\/actus\/industrie-manufacturiere-menace-cyber\/","og_site_name":"Stormshield","article_published_time":"2020-05-14T12:00:06+00:00","article_modified_time":"2023-06-23T15:15:38+00:00","og_image":[{"width":1024,"height":647,"url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_115846333-1024x647.jpg","type":"image\/jpeg"}],"author":"Khobeib Ben Boubaker","twitter_card":"summary_large_image","twitter_creator":"@Stormshield","twitter_site":"@Stormshield","twitter_misc":{"\u00c9crit par":"Khobeib Ben Boubaker","Dur\u00e9e de lecture estim\u00e9e":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stormshield.com\/fr\/actus\/industrie-manufacturiere-menace-cyber\/#article","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/industrie-manufacturiere-menace-cyber\/"},"author":{"name":"Khobeib Ben Boubaker","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/5994c276aef6b25198c1d0863a392be1"},"headline":"L\u2019industrie manufacturi\u00e8re \u00e0 l\u2019\u00e9preuve de la menace cyber","datePublished":"2020-05-14T12:00:06+00:00","dateModified":"2023-06-23T15:15:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/industrie-manufacturiere-menace-cyber\/"},"wordCount":1773,"commentCount":0,"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/industrie-manufacturiere-menace-cyber\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_115846333.jpg","keywords":["Cybers\u00e9curit\u00e9 industrielle","La cybers\u00e9curit\u00e9 - par Stormshield"],"articleSection":["Veille s\u00e9curit\u00e9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.stormshield.com\/fr\/actus\/industrie-manufacturiere-menace-cyber\/","url":"https:\/\/www.stormshield.com\/fr\/actus\/industrie-manufacturiere-menace-cyber\/","name":"L\u2019industrie manufacturi\u00e8re \u00e0 l\u2019\u00e9preuve des cyberattaques | Stormshield","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/industrie-manufacturiere-menace-cyber\/#primaryimage"},"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/industrie-manufacturiere-menace-cyber\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_115846333.jpg","datePublished":"2020-05-14T12:00:06+00:00","dateModified":"2023-06-23T15:15:38+00:00","author":{"@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/5994c276aef6b25198c1d0863a392be1"},"description":"Les nouveaux ransomwares, sp\u00e9cialement con\u00e7us pour attaquer les r\u00e9seaux OT, marquent un tournant dans les cyberattaques industrielles. D\u00e9cryptage.","breadcrumb":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/industrie-manufacturiere-menace-cyber\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stormshield.com\/fr\/actus\/industrie-manufacturiere-menace-cyber\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.stormshield.com\/fr\/actus\/industrie-manufacturiere-menace-cyber\/#primaryimage","url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_115846333.jpg","contentUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_115846333.jpg","width":2560,"height":1616},{"@type":"BreadcrumbList","@id":"https:\/\/www.stormshield.com\/fr\/actus\/industrie-manufacturiere-menace-cyber\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stormshield.com\/fr\/"},{"@type":"ListItem","position":2,"name":"L\u2019industrie manufacturi\u00e8re \u00e0 l\u2019\u00e9preuve de la menace cyber"}]},{"@type":"WebSite","@id":"https:\/\/www.stormshield.com\/fr\/#website","url":"https:\/\/www.stormshield.com\/fr\/","name":"Stormshield","description":"Stormshield","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stormshield.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/5994c276aef6b25198c1d0863a392be1","name":"Khobeib Ben Boubaker","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/9320764755f6fe5087f97f8d94a52f55f475795768fd06e5e0695d741066aacf?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9320764755f6fe5087f97f8d94a52f55f475795768fd06e5e0695d741066aacf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9320764755f6fe5087f97f8d94a52f55f475795768fd06e5e0695d741066aacf?s=96&d=mm&r=g","caption":"Khobeib Ben Boubaker"},"description":"A graduate of CESI engineering school and holder of an ESCP Europe MBA, Khobeib began his career at Alcatel Lucent in the Submarine Network entity. His first love was the design of fibre optic systems for intercommunication between countries and operators. R&amp;D engineer, international trainer, business engineer, then Business Unit Director: Khobeib wore many technical and business hats for a decade before coming to Stormshield. And following an initial post as Business Developer for the industrial security offering, he is now at Head of DMI (Defence, Ministries, Industry) Business Line to support the company's strategic ambitions for IT\/OT cybersecurity.","sameAs":["https:\/\/www.linkedin.com\/in\/khobeib-benboubaker-14598061\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/184250","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/users\/48"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/comments?post=184250"}],"version-history":[{"count":8,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/184250\/revisions"}],"predecessor-version":[{"id":439195,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/184250\/revisions\/439195"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media\/184241"}],"wp:attachment":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media?parent=184250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/categories?post=184250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/tags?post=184250"},{"taxonomy":"business_size","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/business_size?post=184250"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/industry?post=184250"},{"taxonomy":"help_mefind","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/help_mefind?post=184250"},{"taxonomy":"features","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/features?post=184250"},{"taxonomy":"type_security","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/type_security?post=184250"},{"taxonomy":"maintenance","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/maintenance?post=184250"},{"taxonomy":"offer","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/offer?post=184250"},{"taxonomy":"administration_tools","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/administration_tools?post=184250"},{"taxonomy":"cloud_offers","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/cloud_offers?post=184250"},{"taxonomy":"listing_product","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/listing_product?post=184250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}