{"id":18590,"date":"2022-03-08T16:38:46","date_gmt":"2022-03-08T14:38:46","guid":{"rendered":"https:\/\/www.kaspersky.fr\/blog\/?p=18590"},"modified":"2022-05-05T13:44:06","modified_gmt":"2022-05-05T11:44:06","slug":"hermeticransom-hermeticwiper-attacks-2022","status":"publish","type":"post","link":"https:\/\/www.kaspersky.fr\/blog\/hermeticransom-hermeticwiper-attacks-2022\/18590\/","title":{"rendered":"Un ransomware comme m\u00e9thode de distraction"},"content":{"rendered":"<p>Nos chercheurs ont analys\u00e9 le programme malveillant HermeticRansom, aussi connu comme Elections GoRansom. En quelques mots, il s\u2019agit d\u2019un outil de chiffrement assez simple. Dans ce cas, c\u2019est l\u2019utilisation qu\u2019en font les cybercriminels qui nous int\u00e9resse.<\/p>\n<h2>Les objectifs de HermeticRansom<\/h2>\n<p>HermeticRansom attaquait les ordinateurs en m\u00eame temps qu\u2019un autre programme malveillant connu comme HermeticWiper, qui se servait des informations publiques partag\u00e9es par la communaut\u00e9 de la s\u00e9curit\u00e9, et a \u00e9t\u00e9 utilis\u00e9 lors des r\u00e9centes attaques informatiques contre l\u2019Ukraine. Selon nos experts, la simplicit\u00e9 relative et discutable du flux de travail de mise en \u0153uvre du malware indique que HermeticRansom a \u00e9t\u00e9 utilis\u00e9 comme \u00e9cran de fum\u00e9e pour les attaques de HermeticWiper.<\/p>\n<h2>Les capacit\u00e9s de HermeticRansom<\/h2>\n<p>Une fois que l\u2019ordinateur de la victime est infect\u00e9, le programme malveillant identifie les disques durs et recueille une liste de l\u2019historique et des fichiers conserv\u00e9s partout sauf dans les dossiers Windows et Program Files. Ensuite, le malware chiffre certaines cat\u00e9gories de fichiers et les renomme en ajoutant l\u2019\u00e9tiquette .encrypted et l\u2019adresse e-mail des op\u00e9rateurs du programme malveillant. Le malware cr\u00e9e \u00e9galement un fichier read_me.html dans le dossier Desktop, laissant une demande de ran\u00e7on et les coordonn\u00e9es des cybercriminels \u00e0 la victime. Le message ressemble \u00e0 \u00e7a\u00a0:<\/p>\n<div id=\"attachment_18594\" style=\"width: 983px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-18594\" class=\"wp-image-18594 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/93\/2022\/03\/02175211\/hermeticransom-hermeticwiper-attacks-2022-featured-ransom-note.png\" alt=\"\" width=\"973\" height=\"469\"><p id=\"caption-attachment-18594\" class=\"wp-caption-text\">Demande de ran\u00e7on laiss\u00e9e par le programme malveillant HermeticRansom<\/p><\/div>\n<p>HermeticRansom chiffre les fichiers avec les extensions suivantes : .inf, .acl, .avi, .bat, .bmp, .cab, .cfg, .chm, .cmd, .com, .crt, .css, .dat, .dip, .dll, .doc, .dot, .exe, .gif, .htm, .ico, .iso, .jpg, .mp3, .msi and odt.<\/p>\n<h2>Les particularit\u00e9s de HermeticRansom<\/h2>\n<p>HermeticRansom est \u00e9crit en Golang. Il n\u2019utilise aucun m\u00e9canisme d\u2019offuscation et la m\u00e9thode de chiffrement est assez laborieuse et inefficace. \u00c0 en juger par ces caract\u00e9ristiques et bien d\u2019autres, nos experts pensent que ce programme malveillant a \u00e9t\u00e9 cr\u00e9\u00e9 \u00e0 la h\u00e2te.<\/p>\n<p>Vous pouvez lire l\u2019analyse technique plus d\u00e9taill\u00e9e de ce malware et conna\u00eetre des indicateurs de compromission sur <a href=\"https:\/\/securelist.com\/elections-goransom-and-hermeticwiper-attack\/105960\/\" target=\"_blank\" rel=\"noopener\">notre blog Securelist<\/a>.<\/p>\n<h2>Comment vous prot\u00e9ger<\/h2>\n<p>Les solutions de s\u00e9curit\u00e9 de Kaspersky d\u00e9tectent le programme malveillant HermeticRansom et les menaces similaires. Nous disposons d\u2019un vaste \u00e9ventail d\u2019outils qui assurent la protection des ordinateurs des particuliers et de l\u2019infrastructure des entreprises. On y trouve notamment\u00a0:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.fr\/plus?icid=fr_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kplus___\" target=\"_blank\" rel=\"noopener\">Kaspersky Internet Security<\/a>: notre solution de s\u00e9curit\u00e9 multi-plateforme destin\u00e9e aux particuliers ;<\/li>\n<li><a href=\"https:\/\/www.kaspersky.fr\/small-to-medium-business-security\/cloud?icid=fr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kescloud___\" target=\"_blank\" rel=\"noopener\">Kaspersky Endpoint Security Cloud<\/a>: notre solution qui assure la protection des entreprises ;<\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/kaspersky-anti-ransomware-tool-for-business\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=fr_KB_nv0092&amp;utm_content=link&amp;utm_term=fr_kdaily_organic_dvnb492qlah6rfr\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Anti-Ransomware Tool<\/a>: notre solution gratuite destin\u00e9e aux entreprises et qui peut fonctionner comme couche de protection suppl\u00e9mentaire en compl\u00e9ment de produits d\u2019autres fabricants.<\/li>\n<\/ul>\n<p><strong><input type=\"hidden\" class=\"category_for_banner\" value=\"kart-banner\"><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>L\u2019outil de chiffrement HermeticRansom a \u00e9t\u00e9 utilis\u00e9 comme m\u00e9thode de distraction pour appuyer les attaques de HermeticWiper.<\/p>\n","protected":false},"author":2706,"featured_media":18591,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2112,3150,686,3151],"tags":[4263,4264,3918,353,2544],"class_list":{"0":"post-18590","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-threats","10":"category-smb","11":"tag-hermeticransom","12":"tag-hermeticwiper","13":"tag-outil-de-chiffrement","14":"tag-ransomware","15":"tag-wiper"},"hreflang":[{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/hermeticransom-hermeticwiper-attacks-2022\/18590\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/hermeticransom-hermeticwiper-attacks-2022\/23946\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/hermeticransom-hermeticwiper-attacks-2022\/19430\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/hermeticransom-hermeticwiper-attacks-2022\/9767\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/hermeticransom-hermeticwiper-attacks-2022\/26207\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/hermeticransom-hermeticwiper-attacks-2022\/24170\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/hermeticransom-hermeticwiper-attacks-2022\/23979\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/hermeticransom-hermeticwiper-attacks-2022\/26955\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/hermeticransom-hermeticwiper-attacks-2022\/26497\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/hermeticransom-hermeticwiper-attacks-2022\/32452\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/hermeticransom-hermeticwiper-attacks-2022\/10541\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/hermeticransom-hermeticwiper-attacks-2022\/43825\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/hermeticransom-hermeticwiper-attacks-2022\/19047\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/hermeticransom-hermeticwiper-attacks-2022\/15827\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/hermeticransom-hermeticwiper-attacks-2022\/28234\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/hermeticransom-hermeticwiper-attacks-2022\/28141\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/hermeticransom-hermeticwiper-attacks-2022\/24851\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/hermeticransom-hermeticwiper-attacks-2022\/30289\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/hermeticransom-hermeticwiper-attacks-2022\/30065\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.fr\/blog\/tag\/ransomware\/","name":"ransomware"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/posts\/18590","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/comments?post=18590"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/posts\/18590\/revisions"}],"predecessor-version":[{"id":18610,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/posts\/18590\/revisions\/18610"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/media\/18591"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/media?parent=18590"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/categories?post=18590"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/tags?post=18590"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}