{"id":10970,"date":"2023-06-12T06:39:02","date_gmt":"2023-06-12T04:39:02","guid":{"rendered":"https:\/\/www.auditsi.eu\/?p=10970"},"modified":"2023-04-02T13:56:09","modified_gmt":"2023-04-02T11:56:09","slug":"panorama-de-la-cybermenace-2022","status":"publish","type":"post","link":"https:\/\/www.auditsi.eu\/?p=10970","title":{"rendered":"Panorama de la cybermenace 2022"},"content":{"rendered":"<p style=\"text-align: justify;\">L&#8217;Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d&#8217;information (ANSSI) a publi\u00e9 son Panorama de la cybermenace qui fait \u00e9tat des <strong>grandes tendances de la menace<\/strong> ayant rythm\u00e9 l&#8217;ann\u00e9e 2022. Avec un <strong>niveau g\u00e9n\u00e9ral qui reste \u00e9lev\u00e9<\/strong>, l\u2019ANSSI constate que cette cybermenace touche de moins en moins d\u2019op\u00e9rateurs r\u00e9gul\u00e9s et <strong>se d\u00e9porte sur des entit\u00e9s moins bien prot\u00e9g\u00e9es<\/strong>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-7454\" src=\"https:\/\/www.auditsi.eu\/wp-content\/uploads\/2018\/06\/anssi_visuel_square500.png\" alt=\"Logo ANSSI\" width=\"500\" height=\"500\" srcset=\"https:\/\/www.auditsi.eu\/wp-content\/uploads\/2018\/06\/anssi_visuel_square500.png 500w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2018\/06\/anssi_visuel_square500-150x150.png 150w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2018\/06\/anssi_visuel_square500-300x300.png 300w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/p>\n<p style=\"text-align: justify;\">Apr\u00e8s une accalmie lors du premier semestre, la menace cybercriminelle et plus sp\u00e9cifiquement celle li\u00e9e aux <strong>ran\u00e7ongiciels<\/strong> a connu un regain d\u2019activit\u00e9s fin 2022, se maintenant alors \u00e0 un niveau \u00e9lev\u00e9.<br \/>\n&nbsp;<br \/>\nCette menace cybercriminelle touche particuli\u00e8rement :<\/p>\n<ul>\n<li style=\"text-align: justify;\">les TPE, PME et ETI (40 % des ran\u00e7ongiciels trait\u00e9s ou rapport\u00e9s \u00e0 l\u2019ANSSI en 2022)<\/li>\n<li style=\"text-align: justify;\">les collectivit\u00e9s territoriales (23 %)<\/li>\n<li style=\"text-align: justify;\">les \u00e9tablissements publics de sant\u00e9 (10 %)<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">A l\u2019image de l\u2019ann\u00e9e pr\u00e9c\u00e9dente, la menace d\u2019<strong>espionnage informatique<\/strong> est celle qui a le plus mobilis\u00e9 les \u00e9quipes de l\u2019ANSSI. Pr\u00e8s de la moiti\u00e9 des op\u00e9rations de cyberd\u00e9fense de l\u2019agence en 2022 impliquaient des modes op\u00e9ratoires associ\u00e9s en source ouverte \u00e0 la Chine. R\u00e9p\u00e9t\u00e9es, ces intrusions d\u00e9montrent une <strong>volont\u00e9 soutenue de s\u2019introduire dans les r\u00e9seaux d\u2019entit\u00e9s fran\u00e7aises strat\u00e9giques<\/strong>.<\/p>\n<p style=\"text-align: justify;\">L\u2019invasion russe de l\u2019Ukraine a g\u00e9n\u00e9r\u00e9 un contexte favorable \u00e0 l\u2019augmentation d\u2019<strong>actions de d\u00e9stabilisation<\/strong> en Europe. L\u2019ANSSI a observ\u00e9 des attaques par d\u00e9ni de service distribu\u00e9, par sabotage informatique ainsi que des op\u00e9rations informationnelles s\u2019appuyant sur des compromissions de SI.<\/p>\n<p style=\"text-align: justify;\">Comme d\u00e9j\u00e0 observ\u00e9 pr\u00e9c\u00e9demment, les diff\u00e9rents profils d\u2019attaquants continuent \u00e0 user d\u2019outils et de techniques similaires. Cette porosit\u00e9 complexifie la caract\u00e9risation et l\u2019imputation des activit\u00e9s malveillantes. Les attaquants \u00e9tatiques s\u2019inspirent des m\u00e9thodes cybercriminelles et utilisent de plus en plus de ran\u00e7ongiciels \u00e0 des fins de d\u00e9stabilisation dans le cadre d\u2019<strong>op\u00e9rations de sabotage informatique<\/strong>.<\/p>\n<p style=\"text-align: justify;\">Face \u00e0 ces menaces, les \u00e9tablissements priv\u00e9s comme publics se doivent de prendre conscience du risque cyber \u00e0 son juste niveau en adoptant les bonnes mesures pour se prot\u00e9ger via :<\/p>\n<ul>\n<li style=\"text-align: justify;\">l\u2019application rigoureuse d\u2019une politique de mise \u00e0 jour et du <strong>guide d\u2019hygi\u00e8ne informatique<\/strong> ;<\/li>\n<li style=\"text-align: justify;\">une sensibilisation r\u00e9guli\u00e8re des collaborateurs ;<\/li>\n<li style=\"text-align: justify;\">le d\u00e9veloppement de capacit\u00e9s de d\u00e9tection et de traitement d\u2019incident.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">Retrouvez les recommandations sur le site de l\u2019ANSSI : <a href=\"https:\/\/www.ssi.gouv.fr\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.ssi.gouv.fr\/<\/a><\/p>\n<p style=\"text-align: justify;\">Par ailleurs, la transposition de la nouvelle <strong>directive Network and information system security (NIS2)<\/strong> en droit fran\u00e7ais au deuxi\u00e8me semestre 2024 au plus tard va permettre d\u2019<strong>\u00e9lever le niveau de cybers\u00e9curit\u00e9<\/strong> de milliers d\u2019entit\u00e9s, allant de la PME aux entreprises du CAC40, sur \u00e0 minima 18 secteurs d\u2019activit\u00e9.<\/p>\n<div id=\"sconnect-is-installed\" style=\"display: none;\">2.13.0.0<\/div>\n<div id=\"sconnect-is-installed\" style=\"display: none;\">2.13.0.0<\/div>\n<div id=\"sconnect-is-installed\" style=\"display: none;\">2.13.0.0<\/div>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img decoding=\"async\" src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Panorama%20de%20la%20cybermenace%202022\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"excerpt":{"rendered":"<p>L&#8217;Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d&#8217;information (ANSSI) a publi\u00e9 son Panorama de la cybermenace qui fait \u00e9tat des grandes tendances de la menace ayant rythm\u00e9 l&#8217;ann\u00e9e 2022. Avec un niveau g\u00e9n\u00e9ral qui reste \u00e9lev\u00e9, l\u2019ANSSI constate que cette cybermenace touche de moins en moins d\u2019op\u00e9rateurs r\u00e9gul\u00e9s et se d\u00e9porte sur des entit\u00e9s moins &#8230;<\/p>\n<p><a href=\"https:\/\/www.auditsi.eu\/?p=10970\" class=\"more-link\">Continue reading &lsquo;Panorama de la cybermenace 2022&rsquo; &raquo;<\/a><\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Panorama%20de%20la%20cybermenace%202022\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"ngg_post_thumbnail":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[35,30],"tags":[1076,2878,499,2877,2664,2324,2494,2631,117,2616,2879,2144,2790,2636,317,2789],"class_list":["post-10970","post","type-post","status-publish","format-standard","hentry","category-securite-informatique","category-sites-internet","tag-anssi","tag-chine","tag-cybercriminalite","tag-cyberdefense","tag-cybermenace","tag-cybersecurite","tag-deni-de-service","tag-destabilisation","tag-espionnage","tag-guerre","tag-nis2","tag-rancongiciel","tag-russie","tag-sabotage","tag-sensibilisation-des-utilisateurs","tag-ukraine"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":false,"_links":{"self":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/10970","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=10970"}],"version-history":[{"count":5,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/10970\/revisions"}],"predecessor-version":[{"id":10974,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/10970\/revisions\/10974"}],"wp:attachment":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=10970"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=10970"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=10970"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}