{"id":235932,"date":"2021-10-06T14:17:56","date_gmt":"2021-10-06T13:17:56","guid":{"rendered":"https:\/\/www.stormshield.com\/?p=235932"},"modified":"2024-04-08T13:57:09","modified_gmt":"2024-04-08T12:57:09","slug":"alerte-securite-ursnif-la-reponse-des-produits-stormshield","status":"publish","type":"post","link":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-ursnif-la-reponse-des-produits-stormshield\/","title":{"rendered":"Alerte s\u00e9curit\u00e9 Ursnif : la r\u00e9ponse des produits Stormshield"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-235944\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/fig12-1024x310.png\" alt=\"\" width=\"800\" height=\"242\" srcset=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/fig12-1024x310.png 1024w, https:\/\/www.stormshield.com\/wp-content\/uploads\/fig12-300x91.png 300w, https:\/\/www.stormshield.com\/wp-content\/uploads\/fig12-768x232.png 768w, https:\/\/www.stormshield.com\/wp-content\/uploads\/fig12-700x212.png 700w, https:\/\/www.stormshield.com\/wp-content\/uploads\/fig12.png 1395w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<p><strong>Nos \u00e9quipes de s\u00e9curit\u00e9 ont constat\u00e9 courant septembre un pic d\u2019attaques men\u00e9es \u00e0 l\u2019aide du malware Ursnif. Les communications d\u2019autres acteurs de la cybers\u00e9curit\u00e9 font \u00e9tat de plus de 2\u00a0000 soci\u00e9t\u00e9s italiennes, cibl\u00e9es \u00e0 travers une vingtaine de campagnes \u00e0 ce jour. Retrouvez ici une analyse du dropper d\u2019Ursnif et des protections Stormshield.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2>Le contexte de l'attaque<\/h2>\n<p>Aux origines de ce <em>stealer<\/em>, on retrouve le groupe TA544. Cet acteur cyber-criminel distribue des logiciels malveillants bancaires et d'autres malwares dans diverses r\u00e9gions (particuli\u00e8rement en Allemagne, Espagne et Pologne \u2013 en plus de l\u2019Italie). Le malware Ursnif est \u00e9galement connu sous le nom de Gozi et a pour objectif de d\u00e9rober des informations bancaires sur les ordinateurs cibl\u00e9s, comme par exemple des donn\u00e9es de cartes de cr\u00e9dit. Ce malware n\u2019en est pas \u00e0 son coup d\u2019essai, puisqu\u2019il existe depuis 2007 et \u00e9volue depuis lors.<\/p>\n<p>Dans ce document, nous vous proposons <strong>une analyse du dropper d\u2019Ursnif et des protections Stormshield contre le dropper et le payload du malware<\/strong>.<\/p>\n<p>&nbsp;<\/p>\n<h2>Le vecteur initial de l'attaque<\/h2>\n<p>Comme bien trop souvent, \u00e0 l\u2019origine de l\u2019infection nous retrouvons une campagne de phishing cibl\u00e9e, coupl\u00e9e \u00e0 de l\u2019ing\u00e9nierie sociale. Le but recherch\u00e9 est que des victimes t\u00e9l\u00e9chargent un document Excel, qui servira de programme d\u2019installation et d\u00e9tonera le malware \u00e0 proprement parler.<\/p>\n<p>Nous le verrons par la suite : <strong>le document n\u00e9cessite express\u00e9ment une version italienne de Microsoft Office ainsi que des param\u00e8tres r\u00e9gionaux italiens<\/strong>.<\/p>\n<p>&nbsp;<\/p>\n<h2>Les d\u00e9tails techniques de l'attaque<\/h2>\n<h3>A. Introduction<\/h3>\n<p>Le document initial est un document Excel au format 97\/2003 nomm\u00e9 <strong>\u00ab <em>2021_DDT_0008606.xls<\/em> \u00bb<\/strong> et portant l\u2019empreinte num\u00e9rique SHA-256 suivante <strong>\u00ab <em>14a748a512469ac740b93fda94f95dc9 051b2029621bbd72b431338d13448c4c<\/em> \u00bb<\/strong>.<\/p>\n<p>L\u2019ex\u00e9cution de ce maldoc se fait en plusieurs \u00e9tapes dont la derni\u00e8re correspond au t\u00e9l\u00e9chargement du malware sous forme de fichier \u00ab <em>.dll<\/em> \u00bb, qui se chargera de voler les informations bancaires.<\/p>\n<p>Il est \u00e0 noter que l\u2019attaque est fortement cibl\u00e9e et impossible \u00e0 reproduire pour les postes non-italien, ce qui rend la d\u00e9tection par certaines solutions de sandboxing ou d\u2019antivirus difficile. Par ailleurs, le serveur Web d\u00e9livrant la seconde partie de l\u2019attaque est en capacit\u00e9 de savoir qui se connecte et peut choisir de faire varier le contenu en fonction de l\u2019adresse IP qui se pr\u00e9sente \u00e0 lui.<\/p>\n<h3>B. Ouverture du document (\u00e9tape 1)<\/h3>\n<p>Le document Excel ne pr\u00e9sente qu\u2019une seule feuille, n\u2019affiche pas le quadrillage et n\u2019ex\u00e9cute pas de macro automatiquement. \u00c0 premi\u00e8re vue, le document pr\u00e9sente une facture dont le niveau de zoom est tr\u00e8s fortement diminu\u00e9 :<\/p>\n<div id=\"attachment_235933\" style=\"width: 160px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-235933\" class=\"wp-image-235933 size-thumbnail\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/fig1-150x150.png\" alt=\"\" width=\"150\" height=\"150\" \/><p id=\"caption-attachment-235933\" class=\"wp-caption-text\">Fig. 1 : aper\u00e7u du fichier<\/p><\/div>\n<p>L\u2019utilisateur lambda ne remarquera pas que la cellule G122 contient de longues informations textuelles \u00e9crites en blanc sur fond blanc. Pourtant, c\u2019est l\u00e0 le point de d\u00e9marrage du maldoc :<\/p>\n<div id=\"attachment_235934\" style=\"width: 619px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-235934\" class=\"wp-image-235934 size-full\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/fig2.png\" alt=\"\" width=\"609\" height=\"667\" srcset=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/fig2.png 609w, https:\/\/www.stormshield.com\/wp-content\/uploads\/fig2-274x300.png 274w\" sizes=\"auto, (max-width: 609px) 100vw, 609px\" \/><p id=\"caption-attachment-235934\" class=\"wp-caption-text\">Fig. 2 : contenu de la cellule G122<\/p><\/div>\n<p>L\u2019utilisateur aura pour r\u00e9flexe de cliquer sur les informations visibles du document. Il s\u2019agit d\u2019une image et le clic est un d\u00e9clencheur qui viendra ex\u00e9cuter une macro :<\/p>\n<div id=\"attachment_235935\" style=\"width: 527px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-235935\" class=\"wp-image-235935 size-full\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/fig3.png\" alt=\"\" width=\"517\" height=\"134\" srcset=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/fig3.png 517w, https:\/\/www.stormshield.com\/wp-content\/uploads\/fig3-300x78.png 300w\" sizes=\"auto, (max-width: 517px) 100vw, 517px\" \/><p id=\"caption-attachment-235935\" class=\"wp-caption-text\">Fig. 3 : ex\u00e9cution de la macro<\/p><\/div>\n<p>Les cyber-attaquants ont pr\u00e9par\u00e9 le document de telle sorte qu\u2019Excel ne puisse pas afficher les macros :<\/p>\n<div id=\"attachment_235936\" style=\"width: 238px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-235936\" class=\"wp-image-235936 size-full\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/fig4.png\" alt=\"\" width=\"228\" height=\"156\" \/><p id=\"caption-attachment-235936\" class=\"wp-caption-text\">Fig. 4 : macro illisible<\/p><\/div>\n<p>En effet, un document Excel contient \u00e0 la fois les macros lisibles par un humain et un \u00e9quivalent compil\u00e9 pour ex\u00e9cution rapide. Ici, les attaquants ont volontairement corrompu la zone correspondant \u00e0 ce qui serait lisible par un humain. De fait, Excel ne peut pas afficher le code des macros.<\/p>\n<p>Fait int\u00e9ressant : si le fichier venait \u00e0 \u00eatre enregistr\u00e9 sous un autre nom, dans la mesure o\u00f9 le code des macros n\u2019a pas \u00e9t\u00e9 modifi\u00e9, Excel va simplement copier les blocs de donn\u00e9es \u00ab en l\u2019\u00e9tat \u00bb dans le nouveau document, c\u2019est-\u00e0-dire en conservant la corruption.<\/p>\n<h3>C. Extraction du code malveillant (\u00e9tape 2)<\/h3>\n<p>L\u2019extraction du code des macros compil\u00e9 laisse apparaitre plusieurs fonctions de brouillage du code VBA, mais surtout deux fonctions utilis\u00e9es pour d\u00e9chiffrer le texte de la cellule G122 :<\/p>\n<div id=\"attachment_235937\" style=\"width: 744px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-235937\" class=\"wp-image-235937 size-full\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/fig5.png\" alt=\"\" width=\"734\" height=\"253\" srcset=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/fig5.png 734w, https:\/\/www.stormshield.com\/wp-content\/uploads\/fig5-300x103.png 300w, https:\/\/www.stormshield.com\/wp-content\/uploads\/fig5-700x241.png 700w\" sizes=\"auto, (max-width: 734px) 100vw, 734px\" \/><p id=\"caption-attachment-235937\" class=\"wp-caption-text\">Fig. 5 : portions de code des macros<\/p><\/div>\n<p>Le code utilise d\u2019autres fonctions qui travaillent dans une feuille sp\u00e9ciale de type macro pour Excel 4.0. Celle-ci se charge d\u2019\u00e9crire des fonctions de macro Excel 4.0 dans une cellule :<\/p>\n<div id=\"attachment_235938\" style=\"width: 512px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-235938\" class=\"wp-image-235938 size-full\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/fig6.png\" alt=\"\" width=\"502\" height=\"105\" srcset=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/fig6.png 502w, https:\/\/www.stormshield.com\/wp-content\/uploads\/fig6-300x63.png 300w, https:\/\/www.stormshield.com\/wp-content\/uploads\/fig6-500x105.png 500w\" sizes=\"auto, (max-width: 502px) 100vw, 502px\" \/><p id=\"caption-attachment-235938\" class=\"wp-caption-text\">Fig. 6 : \u00e9criture d\u2019une formule dans le fichier Excel<\/p><\/div>\n<p>Tandis que celle-ci vient lancer l\u2019ex\u00e9cution de la formule :<\/p>\n<div id=\"attachment_235939\" style=\"width: 260px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-235939\" class=\"wp-image-235939 size-full\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/fig7.png\" alt=\"\" width=\"250\" height=\"53\" \/><p id=\"caption-attachment-235939\" class=\"wp-caption-text\">Fig. 7 : lancement d\u2019une formule<\/p><\/div>\n<p>Ensuite, le maldoc lit la cellule G122, la d\u00e9chiffre et g\u00e9n\u00e8re une liste de formule :<\/p>\n<div id=\"attachment_235940\" style=\"width: 624px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-235940\" class=\"wp-image-235940 size-full\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/fig8.png\" alt=\"\" width=\"614\" height=\"354\" srcset=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/fig8.png 614w, https:\/\/www.stormshield.com\/wp-content\/uploads\/fig8-300x173.png 300w, https:\/\/www.stormshield.com\/wp-content\/uploads\/fig8-345x198.png 345w\" sizes=\"auto, (max-width: 614px) 100vw, 614px\" \/><p id=\"caption-attachment-235940\" class=\"wp-caption-text\">Fig. 8 : formules g\u00e9n\u00e9r\u00e9es<\/p><\/div>\n<p>C\u2019est ici que les choses deviennent int\u00e9ressantes : Excel a la particularit\u00e9 de faire varier le nom des formules avec la langue utilis\u00e9e sur l\u2019ordinateur. Ainsi, <strong>\u00e0 moins de disposer d\u2019une installation MS Office italienne, l\u2019ex\u00e9cution du maldoc s\u2019arr\u00eatera ici pour raison d\u2019appel \u00e0 fonction non existante dans une autre langue<\/strong> :<\/p>\n<div id=\"attachment_235941\" style=\"width: 439px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-235941\" class=\"wp-image-235941 size-full\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/fig9.png\" alt=\"\" width=\"429\" height=\"296\" srcset=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/fig9.png 429w, https:\/\/www.stormshield.com\/wp-content\/uploads\/fig9-300x207.png 300w\" sizes=\"auto, (max-width: 429px) 100vw, 429px\" \/><p id=\"caption-attachment-235941\" class=\"wp-caption-text\">Fig. 9 : non-ex\u00e9cution d\u2019une formule en italien<\/p><\/div>\n<h3>D. Ex\u00e9cution des formules (\u00e9tape 3)<\/h3>\n<p>La suite est plut\u00f4t simple : ex\u00e9cuter les formules de macro Excel 4.0 une \u00e0 une. Les donn\u00e9es sont encore brouill\u00e9es mais il ressort des \u00e9l\u00e9ments :<\/p>\n<div id=\"attachment_235942\" style=\"width: 745px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-235942\" class=\"wp-image-235942 size-full\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/fig10.png\" alt=\"\" width=\"735\" height=\"76\" srcset=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/fig10.png 735w, https:\/\/www.stormshield.com\/wp-content\/uploads\/fig10-300x31.png 300w, https:\/\/www.stormshield.com\/wp-content\/uploads\/fig10-700x72.png 700w\" sizes=\"auto, (max-width: 735px) 100vw, 735px\" \/><p id=\"caption-attachment-235942\" class=\"wp-caption-text\">Fig. 10 : contenu brut des formules<\/p><\/div>\n<p>Ci-dessous l\u2019\u00e9quivalent des formules en anglais et reconstruites pour \u00eatre lisibles :<\/p>\n<div id=\"attachment_235943\" style=\"width: 672px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-235943\" class=\"wp-image-235943 size-full\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/fig11.png\" alt=\"\" width=\"662\" height=\"220\" srcset=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/fig11.png 662w, https:\/\/www.stormshield.com\/wp-content\/uploads\/fig11-300x100.png 300w\" sizes=\"auto, (max-width: 662px) 100vw, 662px\" \/><p id=\"caption-attachment-235943\" class=\"wp-caption-text\">Fig. 11 : contenu des formules rendues plus lisibles<\/p><\/div>\n<p>La suite de l\u2019infection devient \u00e9vidente :<\/p>\n<ol>\n<li>Utiliser une librairie pr\u00e9sente dans Windows \u00ab <strong><em>urlmon.dll<\/em><\/strong> \u00bb puis appeler la fonction \u00ab <strong><em>URLDownloadToFileA<\/em><\/strong> \u00bb pour t\u00e9l\u00e9charger un fichier depuis une URL externe et l\u2019enregistrer dans un fichier local. Les attaquants savent que le fichier d\u00e9livr\u00e9 sera un fichier \u00ab <strong><em>.dll<\/em><\/strong> \u00bb ;<\/li>\n<li>Utiliser l\u2019utilitaire Windows \u00ab <strong><em>regsrv32.exe<\/em><\/strong> \u00bb pour charger le fichier \u00ab <strong><em>.dll<\/em><\/strong> \u00bb malveillant et lancer son ex\u00e9cution.<\/li>\n<\/ol>\n<p>\u00c0 ce moment-l\u00e0, le payload de type ransomware ou stealer (dans le cas d\u2019Ursnif) est charg\u00e9 et ex\u00e9cut\u00e9 avec les droits de Microsoft Excel. Le poste de la victime est alors corrompu.<\/p>\n<h3>E. IoC<\/h3>\n<ul>\n<li>URL C&amp;C: https:\/\/FLasHgRan[.]Com<\/li>\n<li>Hash du fichier maldoc 14a748a512469ac740b93fda94f95dc9 051b2029621bbd72b431338d13448c4c<\/li>\n<li>Hash du Payload (Dll) : 0c1d347f614bcd43d9628debcc924b3c3276e5fb2ff9307aeeeef2a7920ace25<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>Les moyens de protection Stormshield<\/h2>\n<h3>A. Stormshield Network Security<\/h3>\n<p>Cette attaque \u00e9tant bas\u00e9e sur des fichiers .excel et des .dll, SNS peut prot\u00e9ger gr\u00e2ce \u00e0 la solution de sandboxing disponible dans la licence Premium Security Pack, <strong>Breach Fighter<\/strong>. Le premier fichier est ainsi transmis \u00e0 nos serveurs d\u2019analyse et classifi\u00e9 comme dangereux :<\/p>\n<div id=\"attachment_235944\" style=\"width: 810px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-235944\" class=\"wp-image-235944\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/fig12-1024x310.png\" alt=\"\" width=\"800\" height=\"242\" srcset=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/fig12-1024x310.png 1024w, https:\/\/www.stormshield.com\/wp-content\/uploads\/fig12-300x91.png 300w, https:\/\/www.stormshield.com\/wp-content\/uploads\/fig12-768x232.png 768w, https:\/\/www.stormshield.com\/wp-content\/uploads\/fig12-700x212.png 700w, https:\/\/www.stormshield.com\/wp-content\/uploads\/fig12.png 1395w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><p id=\"caption-attachment-235944\" class=\"wp-caption-text\">Fig. 12 : d\u00e9tection par Breach Fighter<\/p><\/div>\n<p>La premi\u00e8re d\u00e9tection de cette version du dropper sur nos serveurs a eu lieu fin septembre. Le firewall SNS bloque alors les fichiers suivants chez tous nos clients, tandis que le \u00ab patient z\u00e9ro \u00bb devra \u00eatre trait\u00e9 suite au log d\u2019alerte transmis par le firewall. La configuration de Breach Fighter doit \u00eatre en \u00ab suspect \u00bb :<\/p>\n<div id=\"attachment_235945\" style=\"width: 808px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-235945\" class=\"wp-image-235945 size-full\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/fig13.png\" alt=\"\" width=\"798\" height=\"187\" srcset=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/fig13.png 798w, https:\/\/www.stormshield.com\/wp-content\/uploads\/fig13-300x70.png 300w, https:\/\/www.stormshield.com\/wp-content\/uploads\/fig13-768x180.png 768w, https:\/\/www.stormshield.com\/wp-content\/uploads\/fig13-700x164.png 700w\" sizes=\"auto, (max-width: 798px) 100vw, 798px\" \/><p id=\"caption-attachment-235945\" class=\"wp-caption-text\">Fig. 13 : configuration Breach Fighter sur SNS<\/p><\/div>\n<p>Afin que l\u2019analyse soit r\u00e9alis\u00e9e sur les flux mail et les flux web, le mode proxy doit \u00eatre activ\u00e9 avec le d\u00e9chiffrement SSL pour les flux chiffr\u00e9s.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-233125 aligncenter\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/indice-3.png\" alt=\"\" width=\"67\" height=\"50\" \/><\/p>\n<p style=\"text-align: center;\">Indice de confiance de la protection propos\u00e9e par Stormshield<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-227874\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/indice.png\" alt=\"\" width=\"67\" height=\"50\" \/><\/p>\n<p style=\"text-align: center;\">Indice de confiance de l\u2019absence de faux positif<\/p>\n<h3>B. Stormshield Endpoint Security<\/h3>\n<p>Dans cette attaque, il existe deux fichiers : le maldoc \u00ab <strong><em>14a748a512469ac740b93fda94f95dc9051b2029621bbd72b431338d13448c4c<\/em><\/strong> \u00bb et le malware Ursnif \u00ab <strong><em>0c1d347f614bcd43d9628debcc924b3c3276e5fb2ff9307aeeeef2a7920ace25<\/em><\/strong> \u00bb.<\/p>\n<p>Ce paragraphe montre comment la solution SES r\u00e9agit en pr\u00e9sence de ces deux fichiers, avec la protection par d\u00e9faut pr\u00e9sente dans la version 2.1.x.<\/p>\n<h4>1. R\u00e9action de SES lors de l\u2019ex\u00e9cution du maldoc<\/h4>\n<p>S\u2019agissant d\u2019une ex\u00e9cution normale d\u2019un fichier Excel, la solution SES laisse bien le document s\u2019ouvrir et d\u00e9chiffrer ses informations. Par contre, au moment de la tentative de chargement du fichier \u00ab .dll \u00bb t\u00e9l\u00e9charg\u00e9, un blocage apparait :<\/p>\n<div id=\"attachment_235946\" style=\"width: 529px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-235946\" class=\"wp-image-235946 size-full\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/fig14.png\" alt=\"\" width=\"519\" height=\"122\" srcset=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/fig14.png 519w, https:\/\/www.stormshield.com\/wp-content\/uploads\/fig14-300x71.png 300w\" sizes=\"auto, (max-width: 519px) 100vw, 519px\" \/><p id=\"caption-attachment-235946\" class=\"wp-caption-text\">Fig. 14 : log de blocage du fichier .excel par SES<\/p><\/div>\n<p>SES r\u00e9ussit bien \u00e0 isoler et bloquer le comportement malveillant du maldoc et prot\u00e9ger le poste de l\u2019utilisateur et sa soci\u00e9t\u00e9.<\/p>\n<h4>2. R\u00e9action de SES lors du chargement du malware<\/h4>\n<p>Techniquement, la cha\u00eene de l\u2019attaque est termin\u00e9e plus haut. Mais pour \u00eatre exhaustif, SES prot\u00e8ge \u00e9galement l\u2019utilisateur lors du d\u00e9marrage du fichier \u00ab .dll \u00bb malveillant :<\/p>\n<div id=\"attachment_235947\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-235947\" class=\"wp-image-235947 size-large\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/fig15-1024x76.png\" alt=\"\" width=\"1024\" height=\"76\" srcset=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/fig15-1024x76.png 1024w, https:\/\/www.stormshield.com\/wp-content\/uploads\/fig15-300x22.png 300w, https:\/\/www.stormshield.com\/wp-content\/uploads\/fig15-768x57.png 768w, https:\/\/www.stormshield.com\/wp-content\/uploads\/fig15-700x52.png 700w, https:\/\/www.stormshield.com\/wp-content\/uploads\/fig15.png 1077w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-235947\" class=\"wp-caption-text\">Fig. 15 : log de blocage du .dll par SES<\/p><\/div>\n<p>L\u2019action est bloqu\u00e9e par SES qui attribue alors un haut niveau de risque de s\u00e9curit\u00e9 au processus h\u00f4te.<\/p>\n<div id=\"attachment_235948\" style=\"width: 222px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-235948\" class=\"wp-image-235948 size-full\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/fig16.png\" alt=\"\" width=\"212\" height=\"63\" \/><p id=\"caption-attachment-235948\" class=\"wp-caption-text\">Fig. 16 : score attribu\u00e9 au fichier<\/p><\/div>\n<h4>3. Conclusion<\/h4>\n<p>La solution SES a r\u00e9ussi \u00e0 bloquer les actions malveillantes sans n\u00e9cessiter de protection compl\u00e9mentaire, la politique par d\u00e9faut apportant d\u00e9j\u00e0 la protection souhait\u00e9e contre l\u2019acteur TA544 et son malware.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-227874\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/indice.png\" alt=\"\" width=\"67\" height=\"50\" \/><\/p>\n<p style=\"text-align: center;\">Indice de confiance de la protection propos\u00e9e par Stormshield<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-227874\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/indice.png\" alt=\"\" width=\"67\" height=\"50\" \/><\/p>\n<p style=\"text-align: center;\">Indice de confiance de l\u2019absence de faux positif<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nos \u00e9quipes de s\u00e9curit\u00e9 ont constat\u00e9 courant septembre un pic d\u2019attaques men\u00e9es \u00e0 l\u2019aide du malware Ursnif. Les communications d\u2019autres acteurs de la cybers\u00e9curit\u00e9 font \u00e9tat de plus de 2\u00a0000 soci\u00e9t\u00e9s italiennes, cibl\u00e9es \u00e0 travers une vingtaine de campagnes \u00e0 ce jour. Retrouvez ici une&#8230;<\/p>\n","protected":false},"author":61,"featured_media":190179,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1503],"tags":[4368],"business_size":[],"industry":[],"help_mefind":[],"features":[],"type_security":[],"maintenance":[],"offer":[],"administration_tools":[],"cloud_offers":[],"listing_product":[1595,1565,1530],"class_list":["post-235932","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-alertes","tag-la-cybersecurite-par-stormshield","listing_product-breach-fighter-fr","listing_product-ses-fr","listing_product-sns-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Malware Ursnif et analyse technique du dropper | Stormshield<\/title>\n<meta name=\"description\" content=\"Quels moyens de protection Stormshield face au malware Ursnif ? Une alerte s\u00e9curit\u00e9 Stormshield avec une analyse technique du dropper.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-ursnif-la-reponse-des-produits-stormshield\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Malware Ursnif et analyse technique du dropper | Stormshield\" \/>\n<meta property=\"og:description\" content=\"Quels moyens de protection Stormshield face au malware Ursnif ? Une alerte s\u00e9curit\u00e9 Stormshield avec une analyse technique du dropper.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-ursnif-la-reponse-des-produits-stormshield\/\" \/>\n<meta property=\"og:site_name\" content=\"Stormshield\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-06T13:17:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-08T12:57:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"S\u00e9bastien Viou\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:site\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"S\u00e9bastien Viou\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-ursnif-la-reponse-des-produits-stormshield\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-ursnif-la-reponse-des-produits-stormshield\\\/\"},\"author\":{\"name\":\"S\u00e9bastien Viou\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/81e60bc72521ea12c4ff6e962522948f\"},\"headline\":\"Alerte s\u00e9curit\u00e9 Ursnif : la r\u00e9ponse des produits Stormshield\",\"datePublished\":\"2021-10-06T13:17:56+00:00\",\"dateModified\":\"2024-04-08T12:57:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-ursnif-la-reponse-des-produits-stormshield\\\/\"},\"wordCount\":1640,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-ursnif-la-reponse-des-produits-stormshield\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_1534485395-scaled.jpg\",\"keywords\":[\"La cybers\u00e9curit\u00e9 - par Stormshield\"],\"articleSection\":[\"Alertes\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-ursnif-la-reponse-des-produits-stormshield\\\/\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-ursnif-la-reponse-des-produits-stormshield\\\/\",\"name\":\"Malware Ursnif et analyse technique du dropper | Stormshield\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-ursnif-la-reponse-des-produits-stormshield\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-ursnif-la-reponse-des-produits-stormshield\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_1534485395-scaled.jpg\",\"datePublished\":\"2021-10-06T13:17:56+00:00\",\"dateModified\":\"2024-04-08T12:57:09+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/81e60bc72521ea12c4ff6e962522948f\"},\"description\":\"Quels moyens de protection Stormshield face au malware Ursnif ? Une alerte s\u00e9curit\u00e9 Stormshield avec une analyse technique du dropper.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-ursnif-la-reponse-des-produits-stormshield\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-ursnif-la-reponse-des-produits-stormshield\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-ursnif-la-reponse-des-produits-stormshield\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_1534485395-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_1534485395-scaled.jpg\",\"width\":2560,\"height\":1422},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-ursnif-la-reponse-des-produits-stormshield\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Alerte s\u00e9curit\u00e9 Ursnif : la r\u00e9ponse des produits Stormshield\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/\",\"name\":\"Stormshield\",\"description\":\"Stormshield\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/81e60bc72521ea12c4ff6e962522948f\",\"name\":\"S\u00e9bastien Viou\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1f9e044b43142f55cc1ab23bc035ccfa86ed48571830650f7373238e260b03ee?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1f9e044b43142f55cc1ab23bc035ccfa86ed48571830650f7373238e260b03ee?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1f9e044b43142f55cc1ab23bc035ccfa86ed48571830650f7373238e260b03ee?s=96&d=mm&r=g\",\"caption\":\"S\u00e9bastien Viou\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Malware Ursnif et analyse technique du dropper | Stormshield","description":"Quels moyens de protection Stormshield face au malware Ursnif ? Une alerte s\u00e9curit\u00e9 Stormshield avec une analyse technique du dropper.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-ursnif-la-reponse-des-produits-stormshield\/","og_locale":"fr_FR","og_type":"article","og_title":"Malware Ursnif et analyse technique du dropper | Stormshield","og_description":"Quels moyens de protection Stormshield face au malware Ursnif ? Une alerte s\u00e9curit\u00e9 Stormshield avec une analyse technique du dropper.","og_url":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-ursnif-la-reponse-des-produits-stormshield\/","og_site_name":"Stormshield","article_published_time":"2021-10-06T13:17:56+00:00","article_modified_time":"2024-04-08T12:57:09+00:00","og_image":[{"width":2560,"height":1422,"url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg","type":"image\/jpeg"}],"author":"S\u00e9bastien Viou","twitter_card":"summary_large_image","twitter_creator":"@Stormshield","twitter_site":"@Stormshield","twitter_misc":{"\u00c9crit par":"S\u00e9bastien Viou","Dur\u00e9e de lecture estim\u00e9e":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-ursnif-la-reponse-des-produits-stormshield\/#article","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-ursnif-la-reponse-des-produits-stormshield\/"},"author":{"name":"S\u00e9bastien Viou","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/81e60bc72521ea12c4ff6e962522948f"},"headline":"Alerte s\u00e9curit\u00e9 Ursnif : la r\u00e9ponse des produits Stormshield","datePublished":"2021-10-06T13:17:56+00:00","dateModified":"2024-04-08T12:57:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-ursnif-la-reponse-des-produits-stormshield\/"},"wordCount":1640,"commentCount":0,"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-ursnif-la-reponse-des-produits-stormshield\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg","keywords":["La cybers\u00e9curit\u00e9 - par Stormshield"],"articleSection":["Alertes"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-ursnif-la-reponse-des-produits-stormshield\/","url":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-ursnif-la-reponse-des-produits-stormshield\/","name":"Malware Ursnif et analyse technique du dropper | Stormshield","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-ursnif-la-reponse-des-produits-stormshield\/#primaryimage"},"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-ursnif-la-reponse-des-produits-stormshield\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg","datePublished":"2021-10-06T13:17:56+00:00","dateModified":"2024-04-08T12:57:09+00:00","author":{"@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/81e60bc72521ea12c4ff6e962522948f"},"description":"Quels moyens de protection Stormshield face au malware Ursnif ? Une alerte s\u00e9curit\u00e9 Stormshield avec une analyse technique du dropper.","breadcrumb":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-ursnif-la-reponse-des-produits-stormshield\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-ursnif-la-reponse-des-produits-stormshield\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-ursnif-la-reponse-des-produits-stormshield\/#primaryimage","url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg","contentUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg","width":2560,"height":1422},{"@type":"BreadcrumbList","@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-ursnif-la-reponse-des-produits-stormshield\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stormshield.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Alerte s\u00e9curit\u00e9 Ursnif : la r\u00e9ponse des produits Stormshield"}]},{"@type":"WebSite","@id":"https:\/\/www.stormshield.com\/fr\/#website","url":"https:\/\/www.stormshield.com\/fr\/","name":"Stormshield","description":"Stormshield","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stormshield.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/81e60bc72521ea12c4ff6e962522948f","name":"S\u00e9bastien Viou","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/1f9e044b43142f55cc1ab23bc035ccfa86ed48571830650f7373238e260b03ee?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1f9e044b43142f55cc1ab23bc035ccfa86ed48571830650f7373238e260b03ee?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1f9e044b43142f55cc1ab23bc035ccfa86ed48571830650f7373238e260b03ee?s=96&d=mm&r=g","caption":"S\u00e9bastien Viou"}}]}},"_links":{"self":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/235932","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/users\/61"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/comments?post=235932"}],"version-history":[{"count":5,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/235932\/revisions"}],"predecessor-version":[{"id":244956,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/235932\/revisions\/244956"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media\/190179"}],"wp:attachment":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media?parent=235932"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/categories?post=235932"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/tags?post=235932"},{"taxonomy":"business_size","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/business_size?post=235932"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/industry?post=235932"},{"taxonomy":"help_mefind","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/help_mefind?post=235932"},{"taxonomy":"features","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/features?post=235932"},{"taxonomy":"type_security","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/type_security?post=235932"},{"taxonomy":"maintenance","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/maintenance?post=235932"},{"taxonomy":"offer","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/offer?post=235932"},{"taxonomy":"administration_tools","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/administration_tools?post=235932"},{"taxonomy":"cloud_offers","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/cloud_offers?post=235932"},{"taxonomy":"listing_product","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/listing_product?post=235932"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}