{"id":27908,"date":"2021-08-13T16:29:00","date_gmt":"2021-08-13T14:29:00","guid":{"rendered":"https:\/\/perseus.de\/les-dispositifs-nas-synology-sont-attaques-par-le-botnet-stealthworker-la-securite-par-mot-de-passe-comme-protection\/"},"modified":"2026-03-31T07:35:36","modified_gmt":"2026-03-31T05:35:36","slug":"les-dispositifs-nas-synology-sont-attaques-par-le-botnet-stealthworker-la-securite-par-mot-de-passe-comme-protection","status":"publish","type":"post","link":"https:\/\/perseus.de\/fr\/les-dispositifs-nas-synology-sont-attaques-par-le-botnet-stealthworker-la-securite-par-mot-de-passe-comme-protection\/","title":{"rendered":"Les dispositifs NAS Synology sont attaqu\u00e9s par le botnet StealthWorker \u2013 la s\u00e9curit\u00e9 par mot de passe comme protection"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27908\" class=\"elementor elementor-27908 elementor-22942\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dcf4ec4 e-flex e-con-boxed e-con e-parent\" data-id=\"dcf4ec4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e1db58c elementor-widget elementor-widget-image\" data-id=\"e1db58c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"200\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\" class=\"attachment-large size-large wp-image-27802\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png 1024w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-300x75.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-768x192.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025.png 1200w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1258a43 e-flex e-con-boxed e-con e-parent\" data-id=\"1258a43\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2de4e88 e-con-full e-flex e-con e-child\" data-id=\"2de4e88\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4982c80 elementor-widget elementor-widget-text-editor\" data-id=\"4982c80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>13.08.2021<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8348bc5 elementor-widget elementor-widget-heading\" data-id=\"8348bc5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Les dispositifs NAS Synology sont attaqu\u00e9s par le botnet StealthWorker \u2013 la s\u00e9curit\u00e9 par mot de passe comme protection\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb03842 e-con-full e-flex e-con e-child\" data-id=\"eb03842\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-91d0988 elementor-widget elementor-widget-text-editor\" data-id=\"91d0988\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Gr\u00e2ce \u00e0 un botnet (r\u00e9seau de plusieurs programmes informatiques qui effectuent automatiquement et ind\u00e9pendamment certaines t\u00e2ches), les appareils NAS Synology sont actuellement attaqu\u00e9s. Il essaie de deviner les mots de passe et d\u2019installer des malwares. La s\u00e9curit\u00e9 des mots de passe est cruciale dans cette attaque.  <\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f85a5ad e-flex e-con-boxed e-con e-parent\" data-id=\"f85a5ad\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-fad2031 e-con-full e-flex e-con e-child\" data-id=\"fad2031\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8282d30 elementor-widget elementor-widget-text-editor\" data-id=\"8282d30\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Que s\u2019est-il pass\u00e9 ?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ee744d2 e-con-full e-flex e-con e-child\" data-id=\"ee744d2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5ea6506 elementor-widget elementor-widget-text-editor\" data-id=\"5ea6506\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Le 9 ao\u00fbt, des chercheurs en s\u00e9curit\u00e9 de Synology \u00e0 Ta\u00efwan ont averti leurs clients que le botnet dit \u00ab <a href=\"https:\/\/www.synology.com\/en-global\/company\/news\/article\/BruteForce\/Synology\">StealthWorker<\/a> \u00bb avait cibl\u00e9 leurs produits de stockage de donn\u00e9es \u2013 \u00e9galement appel\u00e9s dispositifs de stockage connect\u00e9 en r\u00e9seau (NAS). Gr\u00e2ce \u00e0 une attaque de force brute, une tentative est faite pour acc\u00e9der et chiffrer les dispositifs cibl\u00e9s. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f1dfa8e e-flex e-con-boxed e-con e-parent\" data-id=\"f1dfa8e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bf4f09a elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"bf4f09a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a82985c e-flex e-con-boxed e-con e-parent\" data-id=\"a82985c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-482032b e-con-full e-flex e-con e-child\" data-id=\"482032b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b5f6a5c elementor-widget elementor-widget-text-editor\" data-id=\"b5f6a5c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Quels sont les risques pour mon entreprise li\u00e9s \u00e0 l\u2019attaque des produits Synology ?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8f5d6ed e-con-full e-flex e-con e-child\" data-id=\"8f5d6ed\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-057f5b5 elementor-widget elementor-widget-text-editor\" data-id=\"057f5b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>L\u2019attaque actuelle est une attaque de force brute. Ces donn\u00e9es sont g\u00e9n\u00e9ralement bas\u00e9es sur la devinette des donn\u00e9es de connexion. Les attaquants utilisent g\u00e9n\u00e9ralement une liste de mots de passe connus et courants. Un logiciel teste tous les mots de passe de cette liste. Si elle est \u00e9puis\u00e9e ou si l\u2019une des tentatives r\u00e9ussit, le r\u00e9seau passe \u00e0 un autre compte. Les chercheurs en s\u00e9curit\u00e9 de Synology ont confirm\u00e9 qu\u2019ils ne pensent pas que l\u2019attaque en cours soit li\u00e9e \u00e0 une vuln\u00e9rabilit\u00e9 existante dans leurs produits, mais qu\u2019il s\u2019agit d\u2019une attaque indiscrimin\u00e9e. L\u2019attaque serait men\u00e9e par le botnet \u00ab StealthWorker \u00bb. \u00ab StealthWorker \u00bb est apparu pour la premi\u00e8re fois en 2019 lorsqu\u2019il visait les entreprises de commerce \u00e9lectronique CMS. Synology a publi\u00e9 un communiqu\u00e9 indiquant qu\u2019ils collaborent avec plusieurs CERT du monde entier pour faire dispara\u00eetre le botnet.        <\/p><ol><li>Si un correctif imm\u00e9diat n\u2019est pas possible, Spring a publi\u00e9 des solutions de contournement pour contourner le probl\u00e8me pour le moment<\/li><li>Pour les administrateurs informatiques : isoler les syst\u00e8mes affect\u00e9s dans un \u00ab VLAN vuln\u00e9rable \u00bb (R\u00e9seau Local Virtuel).<\/li><li>Faites attention aux modifications de configuration non autoris\u00e9es sur tous les syst\u00e8mes.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6237d73 e-flex e-con-boxed e-con e-parent\" data-id=\"6237d73\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9dde6dc elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"9dde6dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-02dd0e9 e-flex e-con-boxed e-con e-parent\" data-id=\"02dd0e9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-16d621d e-con-full e-flex e-con e-child\" data-id=\"16d621d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-89904c7 elementor-widget elementor-widget-text-editor\" data-id=\"89904c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Que puis-je faire ?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fae461d e-con-full e-flex e-con e-child\" data-id=\"fae461d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0f04793 elementor-widget elementor-widget-text-editor\" data-id=\"0f04793\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Si vous poss\u00e9dez un appareil NAS Synology, suivez les \u00e9tapes ci-dessous :<\/p>\n<ol>\n<li>V\u00e9rifiez la s\u00e9curit\u00e9 de vos mots de passe. V\u00e9rifiez vos identifiants et assurez-vous que votre mot de passe n\u2019est pas utilis\u00e9 dans d\u2019autres comptes, qu\u2019il est unique et suffisamment complexe. Vous pouvez \u00e9galement envisager d\u2019utiliser un gestionnaire de mots de passe.  <\/li>\n<li>Activez le verrouillage automatique et la protection du compte. Vous pouvez trouver des instructions \u00e9tape par \u00e9tape &nbsp;<a href=\"https:\/\/kb.synology.com\/en-global\/DSM\/help\/DSM\/AdminCenter\/connection_security_account?version=6\">Tiens<\/a>.<\/li>\n<li>Si possible, ajoutez une authentification \u00e0 deux facteurs \u00e0 votre compte. Cette solution vous informe d\u00e8s que quelqu\u2019un tente de se connecter de mani\u00e8re inattendue et v\u00e9rifie votre authenticit\u00e9 d\u2019une autre mani\u00e8re, par exemple via SMS. <\/li>\n<li>Synology a publi\u00e9 une instruction de protection suppl\u00e9mentaire, disponible <a href=\"https:\/\/kb.synology.com\/en-us\/DSM\/tutorial\/How_to_add_extra_security_to_your_Synology_NAS\">ici<\/a> .<\/li>\n<\/ol>\n<p><br><\/p><p>Si vous avez du mal \u00e0 trouver la solution adapt\u00e9e \u00e0 votre appareil et que vous \u00eates client de Perseus, veuillez nous contacter.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>13.08.2021 Les dispositifs NAS Synology sont attaqu\u00e9s par le botnet StealthWorker \u2013 la s\u00e9curit\u00e9 par mot de passe comme protection Gr\u00e2ce \u00e0 un botnet (r\u00e9seau de plusieurs programmes informatiques qui effectuent automatiquement et ind\u00e9pendamment certaines t\u00e2ches), les appareils NAS Synology sont actuellement attaqu\u00e9s. Il essaie de deviner les mots de passe et d\u2019installer des malwares. [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":27905,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[65],"tags":[],"class_list":["post-27908","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-alerte-aux-dangers"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Les dispositifs NAS Synology sont attaqu\u00e9s par le botnet StealthWorker \u2013 la s\u00e9curit\u00e9 par mot de passe comme protection - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/fr\/les-dispositifs-nas-synology-sont-attaques-par-le-botnet-stealthworker-la-securite-par-mot-de-passe-comme-protection\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les dispositifs NAS Synology sont attaqu\u00e9s par le botnet StealthWorker \u2013 la s\u00e9curit\u00e9 par mot de passe comme protection - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"13.08.2021 Les dispositifs NAS Synology sont attaqu\u00e9s par le botnet StealthWorker \u2013 la s\u00e9curit\u00e9 par mot de passe comme protection Gr\u00e2ce \u00e0 un botnet (r\u00e9seau de plusieurs programmes informatiques qui effectuent automatiquement et ind\u00e9pendamment certaines t\u00e2ches), les appareils NAS Synology sont actuellement attaqu\u00e9s. Il essaie de deviner les mots de passe et d\u2019installer des malwares. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/fr\/les-dispositifs-nas-synology-sont-attaques-par-le-botnet-stealthworker-la-securite-par-mot-de-passe-comme-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-13T14:29:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-31T05:35:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung_De-Thumbnail.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/les-dispositifs-nas-synology-sont-attaques-par-le-botnet-stealthworker-la-securite-par-mot-de-passe-comme-protection\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/les-dispositifs-nas-synology-sont-attaques-par-le-botnet-stealthworker-la-securite-par-mot-de-passe-comme-protection\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Les dispositifs NAS Synology sont attaqu\u00e9s par le botnet StealthWorker \u2013 la s\u00e9curit\u00e9 par mot de passe comme protection\",\"datePublished\":\"2021-08-13T14:29:00+00:00\",\"dateModified\":\"2026-03-31T05:35:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/les-dispositifs-nas-synology-sont-attaques-par-le-botnet-stealthworker-la-securite-par-mot-de-passe-comme-protection\\\/\"},\"wordCount\":542,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/les-dispositifs-nas-synology-sont-attaques-par-le-botnet-stealthworker-la-securite-par-mot-de-passe-comme-protection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung_De-Thumbnail.png\",\"articleSection\":[\"Alerte aux dangers\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/les-dispositifs-nas-synology-sont-attaques-par-le-botnet-stealthworker-la-securite-par-mot-de-passe-comme-protection\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/les-dispositifs-nas-synology-sont-attaques-par-le-botnet-stealthworker-la-securite-par-mot-de-passe-comme-protection\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/les-dispositifs-nas-synology-sont-attaques-par-le-botnet-stealthworker-la-securite-par-mot-de-passe-comme-protection\\\/\",\"name\":\"Les dispositifs NAS Synology sont attaqu\u00e9s par le botnet StealthWorker \u2013 la s\u00e9curit\u00e9 par mot de passe comme protection - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/les-dispositifs-nas-synology-sont-attaques-par-le-botnet-stealthworker-la-securite-par-mot-de-passe-comme-protection\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/les-dispositifs-nas-synology-sont-attaques-par-le-botnet-stealthworker-la-securite-par-mot-de-passe-comme-protection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung_De-Thumbnail.png\",\"datePublished\":\"2021-08-13T14:29:00+00:00\",\"dateModified\":\"2026-03-31T05:35:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/les-dispositifs-nas-synology-sont-attaques-par-le-botnet-stealthworker-la-securite-par-mot-de-passe-comme-protection\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/les-dispositifs-nas-synology-sont-attaques-par-le-botnet-stealthworker-la-securite-par-mot-de-passe-comme-protection\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/les-dispositifs-nas-synology-sont-attaques-par-le-botnet-stealthworker-la-securite-par-mot-de-passe-comme-protection\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung_De-Thumbnail.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung_De-Thumbnail.png\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/les-dispositifs-nas-synology-sont-attaques-par-le-botnet-stealthworker-la-securite-par-mot-de-passe-comme-protection\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Les dispositifs NAS Synology sont attaqu\u00e9s par le botnet StealthWorker \u2013 la s\u00e9curit\u00e9 par mot de passe comme protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Les dispositifs NAS Synology sont attaqu\u00e9s par le botnet StealthWorker \u2013 la s\u00e9curit\u00e9 par mot de passe comme protection - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/fr\/les-dispositifs-nas-synology-sont-attaques-par-le-botnet-stealthworker-la-securite-par-mot-de-passe-comme-protection\/","og_locale":"fr_FR","og_type":"article","og_title":"Les dispositifs NAS Synology sont attaqu\u00e9s par le botnet StealthWorker \u2013 la s\u00e9curit\u00e9 par mot de passe comme protection - Perseus Technologies","og_description":"13.08.2021 Les dispositifs NAS Synology sont attaqu\u00e9s par le botnet StealthWorker \u2013 la s\u00e9curit\u00e9 par mot de passe comme protection Gr\u00e2ce \u00e0 un botnet (r\u00e9seau de plusieurs programmes informatiques qui effectuent automatiquement et ind\u00e9pendamment certaines t\u00e2ches), les appareils NAS Synology sont actuellement attaqu\u00e9s. Il essaie de deviner les mots de passe et d\u2019installer des malwares. [&hellip;]","og_url":"https:\/\/perseus.de\/fr\/les-dispositifs-nas-synology-sont-attaques-par-le-botnet-stealthworker-la-securite-par-mot-de-passe-comme-protection\/","og_site_name":"Perseus Technologies","article_published_time":"2021-08-13T14:29:00+00:00","article_modified_time":"2026-03-31T05:35:36+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung_De-Thumbnail.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Xenia Silbe","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/fr\/les-dispositifs-nas-synology-sont-attaques-par-le-botnet-stealthworker-la-securite-par-mot-de-passe-comme-protection\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/fr\/les-dispositifs-nas-synology-sont-attaques-par-le-botnet-stealthworker-la-securite-par-mot-de-passe-comme-protection\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Les dispositifs NAS Synology sont attaqu\u00e9s par le botnet StealthWorker \u2013 la s\u00e9curit\u00e9 par mot de passe comme protection","datePublished":"2021-08-13T14:29:00+00:00","dateModified":"2026-03-31T05:35:36+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/fr\/les-dispositifs-nas-synology-sont-attaques-par-le-botnet-stealthworker-la-securite-par-mot-de-passe-comme-protection\/"},"wordCount":542,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/fr\/les-dispositifs-nas-synology-sont-attaques-par-le-botnet-stealthworker-la-securite-par-mot-de-passe-comme-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung_De-Thumbnail.png","articleSection":["Alerte aux dangers"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/fr\/les-dispositifs-nas-synology-sont-attaques-par-le-botnet-stealthworker-la-securite-par-mot-de-passe-comme-protection\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/fr\/les-dispositifs-nas-synology-sont-attaques-par-le-botnet-stealthworker-la-securite-par-mot-de-passe-comme-protection\/","url":"https:\/\/perseus.de\/fr\/les-dispositifs-nas-synology-sont-attaques-par-le-botnet-stealthworker-la-securite-par-mot-de-passe-comme-protection\/","name":"Les dispositifs NAS Synology sont attaqu\u00e9s par le botnet StealthWorker \u2013 la s\u00e9curit\u00e9 par mot de passe comme protection - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/fr\/les-dispositifs-nas-synology-sont-attaques-par-le-botnet-stealthworker-la-securite-par-mot-de-passe-comme-protection\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/fr\/les-dispositifs-nas-synology-sont-attaques-par-le-botnet-stealthworker-la-securite-par-mot-de-passe-comme-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung_De-Thumbnail.png","datePublished":"2021-08-13T14:29:00+00:00","dateModified":"2026-03-31T05:35:36+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/fr\/les-dispositifs-nas-synology-sont-attaques-par-le-botnet-stealthworker-la-securite-par-mot-de-passe-comme-protection\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/fr\/les-dispositifs-nas-synology-sont-attaques-par-le-botnet-stealthworker-la-securite-par-mot-de-passe-comme-protection\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/fr\/les-dispositifs-nas-synology-sont-attaques-par-le-botnet-stealthworker-la-securite-par-mot-de-passe-comme-protection\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung_De-Thumbnail.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung_De-Thumbnail.png","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/fr\/les-dispositifs-nas-synology-sont-attaques-par-le-botnet-stealthworker-la-securite-par-mot-de-passe-comme-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Les dispositifs NAS Synology sont attaqu\u00e9s par le botnet StealthWorker \u2013 la s\u00e9curit\u00e9 par mot de passe comme protection"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/fr\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27908","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/comments?post=27908"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27908\/revisions"}],"predecessor-version":[{"id":27909,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27908\/revisions\/27909"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media\/27905"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media?parent=27908"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/categories?post=27908"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/tags?post=27908"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}