{"id":236988,"date":"2025-04-11T14:42:39","date_gmt":"2025-04-11T12:42:39","guid":{"rendered":"https:\/\/www.solutions-numeriques.com\/?p=236988"},"modified":"2025-04-11T14:42:39","modified_gmt":"2025-04-11T12:42:39","slug":"offre-dacces-aux-systemes-dune-entreprise-les-specialistes-de-linfiltration-la-vendent-pour-moins-de-3-000-dollars","status":"publish","type":"post","link":"https:\/\/www.solutions-numeriques.com\/offre-dacces-aux-systemes-dune-entreprise-les-specialistes-de-linfiltration-la-vendent-pour-moins-de-3-000-dollars\/","title":{"rendered":"Offre d’acc\u00e8s aux syst\u00e8mes d’une entreprise : les sp\u00e9cialistes de l\u2019infiltration la vendent pour moins de 3 000 dollars"},"content":{"rendered":"
Une \u00e9tude r\u00e9alis\u00e9e par Check Point External Risk Management l\u00e8ve le voile sur ce maillon souvent m\u00e9connu de l\u2019\u00e9conomie cybercriminelle : les courtiers en acc\u00e8s initiaux (Initial Access Brokers<\/em> ou IAB).<\/strong><\/p>\n Le rapport \u00ab Initial Access Broker Report \u2013 March 2025 \u00bb, issu de plus de deux ans d\u2019enqu\u00eate sur le Dark web, livre des informations sur l\u2019\u00e9volution du march\u00e9 clandestin des acc\u00e8s et r\u00e9v\u00e8le que les IAB deviennent “plus s\u00e9lectifs, plus strat\u00e9giques et nettement plus dangereux<\/em>.”<\/p>\n Les donn\u00e9es marquantes de l’enqu\u00eate :<\/p>\n V\u00e9ritables fournisseurs de services pour les groupes de ransomware, les courtiers en acc\u00e8s initiaux (Initial Access Brokers<\/em> ou IAB) vendent l\u2019acc\u00e8s aux syst\u00e8mes des entreprises \u00e0 d\u2019autres groupes malveillants, tels que les acteurs \u00e9tatiques via des forums clandestins. Ils constituent, en quelque sorte, la cha\u00eene d’approvisionnement invisible derri\u00e8re le ransomware.<\/p>\n","protected":false},"excerpt":{"rendered":" Une \u00e9tude r\u00e9alis\u00e9e par Check Point External Risk Management l\u00e8ve le voile sur ce maillon souvent m\u00e9connu de l\u2019\u00e9conomie cybercriminelle : les courtiers en acc\u00e8s initiaux (Initial Access Brokers ou IAB). Le rapport \u00ab Initial Access Broker Report \u2013 March 2025 \u00bb, issu de plus de deux ans d\u2019enqu\u00eate sur le Dark web, livre des […]<\/p>\n","protected":false},"author":9755,"featured_media":177070,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"ngg_post_thumbnail":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1046,17079,422],"tags":[3],"class_list":["post-236988","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybercriminalite","category-cybersecurite-2","category-etudes","tag-cybersecurite"],"acf":[],"jetpack_featured_media_url":"https:\/\/www.solutions-numeriques.com\/wp-content\/uploads\/2023\/09\/anonymous-hacker-concept-dark-web-cybercrime-cyberattack-etc-ai-generated-image.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.solutions-numeriques.com\/wp-json\/wp\/v2\/posts\/236988","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.solutions-numeriques.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.solutions-numeriques.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.solutions-numeriques.com\/wp-json\/wp\/v2\/users\/9755"}],"replies":[{"embeddable":true,"href":"https:\/\/www.solutions-numeriques.com\/wp-json\/wp\/v2\/comments?post=236988"}],"version-history":[{"count":1,"href":"https:\/\/www.solutions-numeriques.com\/wp-json\/wp\/v2\/posts\/236988\/revisions"}],"predecessor-version":[{"id":236989,"href":"https:\/\/www.solutions-numeriques.com\/wp-json\/wp\/v2\/posts\/236988\/revisions\/236989"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.solutions-numeriques.com\/wp-json\/wp\/v2\/media\/177070"}],"wp:attachment":[{"href":"https:\/\/www.solutions-numeriques.com\/wp-json\/wp\/v2\/media?parent=236988"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.solutions-numeriques.com\/wp-json\/wp\/v2\/categories?post=236988"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.solutions-numeriques.com\/wp-json\/wp\/v2\/tags?post=236988"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}\n