{"id":4547,"date":"2015-05-21T09:11:49","date_gmt":"2015-05-21T09:11:49","guid":{"rendered":"http:\/\/kasperskydaily.com\/france\/?p=4547"},"modified":"2020-02-26T15:52:16","modified_gmt":"2020-02-26T15:52:16","slug":"ransomware-protection-video","status":"publish","type":"post","link":"https:\/\/www.kaspersky.fr\/blog\/ransomware-protection-video\/4547\/","title":{"rendered":"Comment Kaspersky vous prot\u00e8ge des ransomwares ?"},"content":{"rendered":"<p>Les ransomwares sont un type de malwares qui vole les fichiers des utilisateurs et exige une ran\u00e7on en \u00e9change. L\u2019approche la plus efficace pour \u00ab\u00a0voler\u00a0\u00bb ces fichiers est de les chiffrer et d\u2019offrir des cl\u00e9s de d\u00e9chiffrement en \u00e9change d\u2019une ran\u00e7on. C\u2019est pourquoi ce type de programmes malveillants est aussi appel\u00e9 \u00ab\u00a0cryptowares\u00a0\u00bb.<\/p>\n<p>C\u2019est en fait un \u00e9norme probl\u00e8me de nos jours et on d\u00e9couvre d\u2019ailleurs quotidiennement de nouveaux exemples de malwares. On en trouve d\u00e9j\u00e0 un grand nombre : <a href=\"https:\/\/www.kaspersky.fr\/blog\/crytolocker-un-nouveau-ransomware-inquietant\/1981\/\" target=\"_blank\" rel=\"noopener\">Cryptolocker<\/a>, <a href=\"https:\/\/threatpost.com\/key-flaw-enables-recovery-of-files-encrypted-by-torrentlocker\/108210\" target=\"_blank\" rel=\"noopener nofollow\">TorrentLocker<\/a>, <a href=\"https:\/\/threatpost.com\/prisonlocker-ransomware-emerges-from-criminal-forums\/103443\" target=\"_blank\" rel=\"noopener nofollow\">PrisonLocker<\/a>, <a href=\"https:\/\/threatpost.com\/malvertising-campaign-on-yahoo-aol-triggers-cryptowall-infections\/108987\" target=\"_blank\" rel=\"noopener nofollow\">Cryptowall<\/a>, <a href=\"https:\/\/www.kaspersky.fr\/blog\/eliminer-ransomware-coinvault\/4444\/\" target=\"_blank\" rel=\"noopener\">CoinVault<\/a>, <a href=\"https:\/\/www.kaspersky.fr\/blog\/ransomware-teslacrypt-jeux-en-ligne\/4383\/\" target=\"_blank\" rel=\"noopener\">TeslaCrypt<\/a>, <a href=\"https:\/\/www.kaspersky.fr\/blog\/version-amelioree-ransomware-ctb-locker\/4244\/\" target=\"_blank\" rel=\"noopener\">CTB-Locker<\/a>, et bien d\u2019autres encore.<\/p>\n<p>Une raison explique pourquoi ce type de malwares est aussi populaire aupr\u00e8s des cybercriminels : ils repr\u00e9sentent un business tr\u00e8s lucratif avec un <a href=\"https:\/\/threatpost.com\/teslacrypt-ransomware-taking-a-toll-on-victims\/112867\" target=\"_blank\" rel=\"noopener nofollow\">plan d\u2019action clair et une mon\u00e9tisation directe<\/a>. Les criminels infectent les ordinateurs\u00a0 des utilisateurs, bloquent leurs fichiers et les utilisateurs qui tiennent \u00e0 leurs documents contactent les criminels et paient la ran\u00e7on.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">TeslaCrypt <a href=\"https:\/\/twitter.com\/hashtag\/ransomware?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#ransomware<\/a> is beginning to take a toll on its victims \u2013 <a href=\"http:\/\/t.co\/WYVr6BnU7L\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/WYVr6BnU7L<\/a> <a href=\"http:\/\/t.co\/iOMJX7wzTd\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/iOMJX7wzTd<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/600756670088675328?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">May 19, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Les cr\u00e9ateurs de ransomwares am\u00e9liorent sans cesse leurs produits et mettent en place des techniques de plus en plus diaboliques pour se faire encore plus d\u2019argent. Par exemple, les ransomwares modernes cachent leurs serveurs de commande sur Tor, ce qui rend la t\u00e2che tr\u00e8s difficile aux enqu\u00eateurs \u00e0 la recherche des cl\u00e9s de d\u00e9chiffrement.<\/p>\n<p>Les criminels offrent m\u00eame un support technique aux victimes afin de les aider \u00e0 r\u00e9aliser le paiement plus facilement. Sans mentionner que les extorqueurs travaillent dur pour trouver des \u00ab\u00a0solutions de distribution\u00a0\u00bb pour leurs malwares : courrier ind\u00e9sirable, <a href=\"https:\/\/www.kaspersky.fr\/blog\/astuces-eviter-phishing-facebook\/4418\/\" target=\"_blank\" rel=\"noopener\">campagnes d\u2019hame\u00e7onnage<\/a>, <a href=\"https:\/\/www.kaspersky.fr\/blog\/ordinateur-un-zombie-verifiez\/4435\/\" target=\"_blank\" rel=\"noopener\">\u00e9normes botnets<\/a>, etc.<\/p>\n<p>Pour faire simple, les ransomwares sont bien trop lucratifs pour disparaitre. Ils sont l\u00e0 pour rester et nous devons apprendre \u00e0 vivre avec eux.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">The best line of <a href=\"https:\/\/twitter.com\/hashtag\/defense?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#defense<\/a> against any <a href=\"https:\/\/twitter.com\/hashtag\/ransomware?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#ransomware<\/a> is to have backed up your machines yesterday. <a href=\"https:\/\/t.co\/cpcBqX1Qy2\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/cpcBqX1Qy2<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/560984613708136448?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">January 30, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>L\u2019option la plus efficace pour vous prot\u00e9ger des ransomwares est de r\u00e9aliser des copies de sauvegarde de vos fichiers importants r\u00e9guli\u00e8rement. Si vous n\u2019avez rien \u00e0 perdre, il n\u2019y a aucune raison que les criminels r\u00e9ussissent \u00e0 vous faire payer pour r\u00e9cup\u00e9rer vos fichiers.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Comment #KasperskyInternetSecurity vous prot\u00e8ge des #ransomwares<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F6yeo&amp;text=Comment+%23KasperskyInternetSecurity+vous+prot%C3%A8ge+des+%23ransomwares\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Kaspersky Internet Security offre une autre option de copie de sauvegarde en temps-r\u00e9el. L\u2019id\u00e9e est simple : si le produit Kaspersky d\u00e9tecte une modification \u00e9trange de vos fichiers, il cr\u00e9e imm\u00e9diatement des copies de ces fichiers afin d\u2019\u00e9viter qu\u2019ils ne vous soient \u00ab\u00a0vol\u00e9s\u00a0\u00bb. Il examine ensuite le logiciel qui tente de modifier vos fichiers. S\u2019il est vraiment suspect, Kaspersky Internet Security le bloquera.<\/p>\n<p>C\u2019est plut\u00f4t simple comme cette vid\u00e9o vous le montre :<\/p>\n<p>\u00a0<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/iX9Ajl8j1Ls?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>\u00a0<\/p>\n<p>Si vous utilisez d\u00e9j\u00e0 <a href=\"https:\/\/kas.pr\/kXh2\" target=\"_blank\" rel=\"noopener\">Kaspersky Internet Security<\/a>, assurez-vous qu\u2019il est <a href=\"https:\/\/www.kaspersky.fr\/blog\/le-conseil-de-la-semaine-comment-combattre-les-ransomwares\/1561\/\" target=\"_blank\" rel=\"noopener\">configur\u00e9 correctement<\/a>.<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les ransomwares sont un \u00e9norme probl\u00e8me de nos jours et de nouveaux exemples de ransomwares apparaissent quotidiennement. Apprenez \u00e0 vous en prot\u00e9ger.  <\/p>\n","protected":false},"author":40,"featured_media":4548,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7],"tags":[1089,491,1124,1125,141,350,414,1069],"class_list":{"0":"post-4547","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-products","8":"tag-coinvault","9":"tag-cryptolocker","10":"tag-cryptowares","11":"tag-ctb-locker","12":"tag-kaspersky-internet-security","13":"tag-produits","14":"tag-ransomwares","15":"tag-teslacrypt"},"hreflang":[{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/ransomware-protection-video\/4547\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ransomware-protection-video\/4849\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/ransomware-protection-video\/3390\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/ransomware-protection-video\/5362\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/ransomware-protection-video\/6106\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/ransomware-protection-video\/6090\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ransomware-protection-video\/10243\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ransomware-protection-video\/8765\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/ransomware-protection-video\/7683\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ransomware-protection-video\/10243\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ransomware-protection-video\/8765\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ransomware-protection-video\/8765\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.fr\/blog\/tag\/coinvault\/","name":"CoinVault"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/posts\/4547","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/comments?post=4547"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/posts\/4547\/revisions"}],"predecessor-version":[{"id":14287,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/posts\/4547\/revisions\/14287"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/media\/4548"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/media?parent=4547"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/categories?post=4547"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/tags?post=4547"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}