{"id":28,"date":"2026-02-15T21:59:29","date_gmt":"2026-02-15T20:59:29","guid":{"rendered":"https:\/\/sio.lycee-saint-john-perse.fr\/portfolio-belhoucine\/?page_id=28"},"modified":"2026-02-15T21:59:30","modified_gmt":"2026-02-15T20:59:30","slug":"veille","status":"publish","type":"page","link":"https:\/\/sio.lycee-saint-john-perse.fr\/portfolio-belhoucine\/veille\/","title":{"rendered":"Veille"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p class=\"has-medium-font-size\" style=\"border-width:1px\"><strong>L\u2019\u00e9volution des ransomwares et du mod\u00e8le Ransomware-as-a-Service (RaaS)<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><em>Objectifs de la veille<\/em><br>Cette veille a pour objectif de suivre l\u2019\u00e9volution des ransomwares et du mod\u00e8le Ransomware-as-a-Service (RaaS), une menace majeure pour les entreprises. Elle vise \u00e0 :<br>\u2022 Comprendre les nouvelles techniques utilis\u00e9es par les groupes cybercriminels<br>\u2022 Identifier les groupes actifs et leurs modes op\u00e9ratoires<br>\u2022 Analyser les tendances du march\u00e9 criminel (industrialisation, professionnalisation)<br>\u2022 Anticiper les risques pour les entreprises<br>\u2022 Suivre les recommandations de d\u00e9fense publi\u00e9es par les organismes sp\u00e9cialis\u00e9s<br>Contexte d\u2019entreprise : Les entreprises, notamment les PME, sont aujourd\u2019hui fortement expos\u00e9es aux attaques par ransomware. Les services informatiques doivent adapter leurs strat\u00e9gies de s\u00e9curit\u00e9 pour r\u00e9duire les risques.<br>Mots-cl\u00e9s utilis\u00e9s : ransomware, RaaS, LockBit, Akira, Play, cyberattaque, double extorsion, chiffrement, fuite de donn\u00e9es, vuln\u00e9rabilit\u00e9s, cybercriminalit\u00e9.<\/li>\n\n\n\n<li><em>Acteurs de la veille<\/em><br>\u2022 Veilleur : \u00e9tudiant en BTS SIO option SISR<br>\u2022 Sources expertes : CERT-FR, Bitdefender, ZATAZ, The Hacker News<br>\u2022 Outils de veille : Feedly, Google Alerts, flux RSS, Twitter\/X, Notion, Trello<\/li>\n\n\n\n<li><em>Fr\u00e9quence<\/em><br>La veille est r\u00e9alis\u00e9e chaque semaine, car :<br>\u2022 Les attaques \u00e9voluent tr\u00e8s rapidement<br>\u2022 De nouveaux groupes apparaissent r\u00e9guli\u00e8rement<br>\u2022 Les failles exploit\u00e9es changent d\u2019un mois \u00e0 l\u2019autre<br>\u2022 Les rapports de cybers\u00e9curit\u00e9 sont publi\u00e9s en continu<\/li>\n\n\n\n<li><em>S\u00e9lection du sujet<\/em><br>Sujet : L\u2019\u00e9volution des ransomwares et du mod\u00e8le Ransomware-as-a-Service.<br>Justification :<br>\u2022 Les ransomwares sont la menace n\u00b01 selon les rapports de cybers\u00e9curit\u00e9<br>\u2022 Le mod\u00e8le RaaS industrialise le cybercrime<br>\u2022 Les groupes criminels se r\u00e9organisent constamment<br>\u2022 Les PME sont de plus en plus cibl\u00e9es<br>\u2022 Le sujet est actuel, riche et tr\u00e8s document\u00e9<\/li>\n\n\n\n<li><em>Organisation de la veille<\/em><br>\u00c9tape 1 : D\u00e9finir la strat\u00e9gie<br>Suivre les \u00e9volutions des ransomwares, des groupes criminels et des techniques d\u2019attaque, en s\u2019appuyant sur des sources fiables et actualis\u00e9es.<br>\u00c9tape 2 : Collecter l\u2019information<br>Outils de collecte :<br>\u2022 Flux RSS : CERT-FR, The Hacker News<br>\u2022 Google Alerts : \u201d, \u201cRaaS\u201d<br>\u2022 Twitter\/X : suivi des chercheurs en cybers\u00e9curit\u00e9 (#ransomware)<br>Outils de curation :<br>\u2022 Feedly : centralisation des sources<br>\u2022 Pocket : sauvegarde d\u2019articles<br>Outils d\u2019organisation :<br>\u2022 Notion \/ OneNote : prise de notes structur\u00e9e<br>\u2022 Trello : tableau de suivi (groupes, techniques, nouveaut\u00e9s)<\/li>\n\n\n\n<li><em>Analyse des informations<\/em><br>Principales tendances observ\u00e9es :<br>\u2022 Hausse des attaques : +11 % en 2024 (Cyberint)<br>\u2022 Concentration des groupes : Qilin, Akira, Play dominent le paysage (ZATAZ)<br>\u2022 Professionnalisation du mod\u00e8le RaaS : support technique, affiliation (IBM Security)<br>\u2022 Sophistication technique : CrazyHunter utilise des m\u00e9canismes avanc\u00e9s (Homeland Security Today)<br>\u2022 R\u00e9silience des groupes historiques : LockBit revient avec de nouvelles versions 4.0 \/ 5.0 (Bitdefender)<\/li>\n\n\n\n<li><em><strong>Diffusion<\/strong><\/em><br>\u2022 Synth\u00e8se int\u00e9gr\u00e9e au dossier E4<br>\u2022 Pr\u00e9sentation orale lors de l\u2019examen<br>\u2022 Possibilit\u00e9 de diffusion via un tableau Netvibes ou Feedly<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>L\u2019\u00e9volution des ransomwares et du mod\u00e8le Ransomware-as-a-Service (RaaS)<\/p>\n","protected":false},"author":74,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-28","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/sio.lycee-saint-john-perse.fr\/portfolio-belhoucine\/wp-json\/wp\/v2\/pages\/28","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sio.lycee-saint-john-perse.fr\/portfolio-belhoucine\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sio.lycee-saint-john-perse.fr\/portfolio-belhoucine\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sio.lycee-saint-john-perse.fr\/portfolio-belhoucine\/wp-json\/wp\/v2\/users\/74"}],"replies":[{"embeddable":true,"href":"https:\/\/sio.lycee-saint-john-perse.fr\/portfolio-belhoucine\/wp-json\/wp\/v2\/comments?post=28"}],"version-history":[{"count":1,"href":"https:\/\/sio.lycee-saint-john-perse.fr\/portfolio-belhoucine\/wp-json\/wp\/v2\/pages\/28\/revisions"}],"predecessor-version":[{"id":29,"href":"https:\/\/sio.lycee-saint-john-perse.fr\/portfolio-belhoucine\/wp-json\/wp\/v2\/pages\/28\/revisions\/29"}],"wp:attachment":[{"href":"https:\/\/sio.lycee-saint-john-perse.fr\/portfolio-belhoucine\/wp-json\/wp\/v2\/media?parent=28"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}