{"id":37770,"date":"2021-02-12T08:31:44","date_gmt":"2021-02-12T08:31:44","guid":{"rendered":"https:\/\/\/une-menace-linux-complexe-sattaquant-aux-supercalculateurs\/"},"modified":"2021-02-12T08:31:44","modified_gmt":"2021-02-12T08:31:44","slug":"une-menace-linux-complexe-sattaquant-aux-supercalculateurs","status":"publish","type":"post","link":"https:\/\/www.ecinews.fr\/fr\/une-menace-linux-complexe-sattaquant-aux-supercalculateurs\/","title":{"rendered":"Une menace Linux complexe s\u2019attaquant aux supercalculateurs"},"content":{"rendered":"<p>Les chercheurs d\u2019ESET ont proc\u00e9d\u00e9 \u00e0 la r\u00e9tro-ing\u00e9nierie de ce malware complexe, qui existe sous forme portable pour de nombreux syst\u00e8mes d\u2019exploitation dont Linux, BSD, Solaris, et peut-\u00eatre AIX et Windows. \u00ab&nbsp;Nous avons nomm\u00e9 ce malware Kobalos pour la petite taille de son code et ses nombreuses astuces. Dans la mythologie grecque, un kobalos est une petite cr\u00e9ature malicieuse,&nbsp;\u00bb explique Marc-\u00c9tienne L\u00e9veill\u00e9, qui a enqu\u00eat\u00e9 sur Kobalos. \u00ab&nbsp;Il faut dire que ce niveau de sophistication n\u2019est que rarement observ\u00e9 dans les&nbsp;<a href=\"http:\/\/web-engage.augure.com\/pub\/tracking\/642874\/04606176074368851612340057234-hl-com.com?id1=aHR0cHMlM0ElMkYlMkZ3d3cuZXNldC5jb20lMkZmciUyRmJ1c2luZXNzJTJGcGFydG5lciUyRmFu%0AdGktbWFsd2FyZS1zZGslMkYlM0Z1dG1fc291cmNlJTNEaGxjb20lMjZhbXAlM0J1dG1fbWVkaXVt%0AJTNEZW1haWwlMjZhbXAlM0J1dG1fY2FtcGFpZ24lM0RjcGFtcGxpZmljYXRpb24lMjZhbXAlM0J1%0AdG1fY29udGVudCUzRGNwLWtvYmFsb3M%3D\" target=\"_blank\" rel=\"noopener\">malwares Linux<\/a>,&nbsp;\u00bb ajoute M. L\u00e9veill\u00e9.<\/p>\n<p>Kobalos est une porte d\u00e9rob\u00e9e comprenant des commandes \u00e9tendues qui ne r\u00e9v\u00e8lent cependant pas les intentions des pirates. \u00ab&nbsp;En bref, Kobalos permet l\u2019acc\u00e8s \u00e0 distance au syst\u00e8me de fichiers, la cr\u00e9ation de sessions de terminal, et des connexions par proxy \u00e0 d\u2019autres serveurs infect\u00e9s par Kobalos,&nbsp;\u00bb poursuit M. L\u00e9veill\u00e9.<\/p>\n<p>Tout serveur compromis par Kobalos peut \u00eatre transform\u00e9 en serveur de commande et de contr\u00f4le (C&amp;C) par les op\u00e9rateurs \u00e0 l\u2019aide d\u2019une seule commande. Comme les adresses IP et les ports du serveur de C&amp;C sont cod\u00e9s en dur dans l\u2019ex\u00e9cutable, les op\u00e9rateurs peuvent alors g\u00e9n\u00e9rer de nouveaux \u00e9chantillons de Kobalos qui utilisent ce nouveau serveur de C&amp;C. Dans la plupart des syst\u00e8mes compromis par Kobalos, le client de communication s\u00e9curis\u00e9e (SSH) est \u00e9galement compromis afin de voler des identifiants.<\/p>\n<p>\u00ab&nbsp;Les identifiants de toute personne utilisant le client SSH d\u2019une machine compromise seront collect\u00e9s, et ils pourront \u00eatre ensuite utilis\u00e9s par les pirates pour installer Kobalos sur le serveur nouvellement d\u00e9couvert,&nbsp;\u00bb conclut M. L\u00e9veill\u00e9. La mise en place d\u2019une authentification \u00e0 deux facteurs pour la connexion aux serveurs SSH att\u00e9nuera la menace, puisque l\u2019utilisation d\u2019identifiants vol\u00e9s semble \u00eatre l\u2019un des moyens qu\u2019elle utilise pour se propager sur diff\u00e9rents syst\u00e8mes.<\/p>\n<p><a href=\"https:\/\/www.welivesecurity.com\/2021\/02\/02\/kobalos-complex-linux-threat-high-performance-computing-infrastructure\/\">www.welivesecurity.com\/2021\/02\/02\/kobalos-complex-linux-threat-high-performance-computing-infrastructure\/<\/a><\/p>\n<p><strong><u>\u00c0 propos d&rsquo;ESET<\/u><\/strong><br \/>\nSp\u00e9cialis\u00e9 dans la conception et le d\u00e9veloppement de logiciels de s\u00e9curit\u00e9 pour les entreprises et le grand public, ESET est aujourd\u2019hui le 1er \u00e9diteur de l\u2019Union europ\u00e9enne en mati\u00e8re de s\u00e9curit\u00e9 des endpoints. Pionnier en mati\u00e8re de d\u00e9tection proactive, ESET a \u00e9t\u00e9 d\u00e9sign\u00e9 pour la 2\u00e8me ann\u00e9e cons\u00e9cutive, unique Challenger dans le Gartner Magic Quadrant 2019*, \u00ab\u202fEndpoint Protection \u00bb apr\u00e8s avoir \u00e9t\u00e9 \u00e9valu\u00e9 sur sa performance et sur la qualit\u00e9 de sa vision dans le domaine de la protection des Endpoints. \u00c0 ce jour, l\u2019antivirus ESET NOD32 d\u00e9tient le record mondial de r\u00e9compenses d\u00e9cern\u00e9es par le laboratoire ind\u00e9pendant Virus Bulletin depuis 1998. La technologie ESET prot\u00e8ge aujourd\u2019hui plus d\u2019un milliard d\u2019internautes. *Source\u202f: Gartner Inc, Magic Quadrant for Endpoint Protection Platforms, Peter Firstbrook, Lawrence Pingree, Dionisio Zumerle, Prateek Bhajanka, Paul Webber, August 20, 2019.<\/p>\n<p><a href=\"http:\/\/web-engage.augure.com\/pub\/tracking\/642874\/04606176074368851612340057234-hl-com.com?id1=aHR0cHMlM0ElMkYlMkZ3d3cuZXNldC5jb20lMkZmciUyRiUzRnV0bV9zb3VyY2UlM0RobGNvbSUy%0ANmFtcCUzQnV0bV9tZWRpdW0lM0RlbWFpbCUyNmFtcCUzQnV0bV9jYW1wYWlnbiUzRGNwYW1wbGlm%0AaWNhdGlvbiUyNmFtcCUzQnV0bV9jb250ZW50JTNEY3Ata29iYWxvcw%3D%3D\" target=\"_blank\" rel=\"noopener\">www.eset.com\/fr\/<\/a>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les chercheurs d\u2019ESET, 1er \u00e9diteur Europ\u00e9en de solutions de s\u00e9curit\u00e9, ont d\u00e9couvert Kobalos, un malware qui s\u2019attaque \u00e0 des clusters d\u2019ordinateurs haute performance (HPC). ESET a travaill\u00e9 avec l\u2019\u00e9quipe de s\u00e9curit\u00e9 informatique du CERN et d\u2019autres entreprises impliqu\u00e9es dans l\u2019att\u00e9nuation des attaques sur ces r\u00e9seaux de recherche scientifique. Un grand fournisseur d\u2019acc\u00e8s Internet asiatique, un prestataire nord-am\u00e9ricain de protection des terminaux, ainsi que plusieurs serveurs priv\u00e9s, font \u00e9galement partie des cibles.<\/p>\n","protected":false},"author":9,"featured_media":160969,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[],"tags":[],"domains":[47],"ppma_author":[1141],"class_list":["post-37770","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","domains-electronique-eci"],"acf":[],"yoast_head":"<title>Une menace Linux complexe s\u2019attaquant aux supercalculateurs ...<\/title>\n<meta name=\"description\" content=\"Les chercheurs d\u2019ESET, 1er \u00e9diteur Europ\u00e9en de solutions de s\u00e9curit\u00e9, ont d\u00e9couvert Kobalos, un malware qui s\u2019attaque \u00e0 des clusters...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/37770\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Une menace Linux complexe s\u2019attaquant aux supercalculateurs\" \/>\n<meta property=\"og:description\" content=\"Les chercheurs d\u2019ESET, 1er \u00e9diteur Europ\u00e9en de solutions de s\u00e9curit\u00e9, ont d\u00e9couvert Kobalos, un malware qui s\u2019attaque \u00e0 des clusters d\u2019ordinateurs haute performance (HPC). ESET a travaill\u00e9 avec l\u2019\u00e9quipe de s\u00e9curit\u00e9 informatique du CERN et d\u2019autres entreprises impliqu\u00e9es dans l\u2019att\u00e9nuation des attaques sur ces r\u00e9seaux de recherche scientifique. Un grand fournisseur d\u2019acc\u00e8s Internet asiatique, un prestataire nord-am\u00e9ricain de protection des terminaux, ainsi que plusieurs serveurs priv\u00e9s, font \u00e9galement partie des cibles.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/37770\/\" \/>\n<meta property=\"og:site_name\" content=\"EENewsEurope\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-12T08:31:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.eenewseurope.com\/wp-content\/uploads\/import\/default\/files\/sites\/default\/files\/images\/eci9088_eset_actu.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1117\" \/>\n\t<meta property=\"og:image:height\" content=\"655\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alain Dieul\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alain Dieul\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cdn.eenewseurope.com\/fr\/une-menace-linux-complexe-sattaquant-aux-supercalculateurs\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cdn.eenewseurope.com\/fr\/une-menace-linux-complexe-sattaquant-aux-supercalculateurs\/\"},\"author\":{\"name\":\"Alain Dieul\",\"@id\":\"https:\/\/www.eenewseurope.com\/fr\/#\/schema\/person\/568c789a4794bd460460501ba91f5daf\"},\"headline\":\"Une menace Linux complexe s\u2019attaquant aux supercalculateurs\",\"datePublished\":\"2021-02-12T08:31:44+00:00\",\"dateModified\":\"2021-02-12T08:31:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cdn.eenewseurope.com\/fr\/une-menace-linux-complexe-sattaquant-aux-supercalculateurs\/\"},\"wordCount\":516,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.eenewseurope.com\/fr\/#organization\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/cdn.eenewseurope.com\/fr\/une-menace-linux-complexe-sattaquant-aux-supercalculateurs\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cdn.eenewseurope.com\/fr\/une-menace-linux-complexe-sattaquant-aux-supercalculateurs\/\",\"url\":\"https:\/\/cdn.eenewseurope.com\/fr\/une-menace-linux-complexe-sattaquant-aux-supercalculateurs\/\",\"name\":\"Une menace Linux complexe s\u2019attaquant aux supercalculateurs -\",\"isPartOf\":{\"@id\":\"https:\/\/www.eenewseurope.com\/fr\/#website\"},\"datePublished\":\"2021-02-12T08:31:44+00:00\",\"dateModified\":\"2021-02-12T08:31:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cdn.eenewseurope.com\/fr\/une-menace-linux-complexe-sattaquant-aux-supercalculateurs\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cdn.eenewseurope.com\/fr\/une-menace-linux-complexe-sattaquant-aux-supercalculateurs\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cdn.eenewseurope.com\/fr\/une-menace-linux-complexe-sattaquant-aux-supercalculateurs\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/test.eenewseurope.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Une menace Linux complexe s\u2019attaquant aux supercalculateurs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.eenewseurope.com\/fr\/#website\",\"url\":\"https:\/\/www.eenewseurope.com\/fr\/\",\"name\":\"EENewsEurope\",\"description\":\"Just another WordPress site\",\"publisher\":{\"@id\":\"https:\/\/www.eenewseurope.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.eenewseurope.com\/fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.eenewseurope.com\/fr\/#organization\",\"name\":\"EENewsEurope\",\"url\":\"https:\/\/www.eenewseurope.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.eenewseurope.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg\",\"contentUrl\":\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg\",\"width\":283,\"height\":113,\"caption\":\"EENewsEurope\"},\"image\":{\"@id\":\"https:\/\/www.eenewseurope.com\/fr\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.eenewseurope.com\/fr\/#\/schema\/person\/568c789a4794bd460460501ba91f5daf\",\"name\":\"Alain Dieul\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.eenewseurope.com\/fr\/#\/schema\/person\/image\/6d32dc651fbcef3b338066625b118364\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/93708ec89b35deb10f4cfbfe144b4e07?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/93708ec89b35deb10f4cfbfe144b4e07?s=96&d=mm&r=g\",\"caption\":\"Alain Dieul\"}}]}<\/script>","yoast_head_json":{"title":"Une menace Linux complexe s\u2019attaquant aux supercalculateurs ...","description":"Les chercheurs d\u2019ESET, 1er \u00e9diteur Europ\u00e9en de solutions de s\u00e9curit\u00e9, ont d\u00e9couvert Kobalos, un malware qui s\u2019attaque \u00e0 des clusters...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/37770\/","og_locale":"fr_FR","og_type":"article","og_title":"Une menace Linux complexe s\u2019attaquant aux supercalculateurs","og_description":"Les chercheurs d\u2019ESET, 1er \u00e9diteur Europ\u00e9en de solutions de s\u00e9curit\u00e9, ont d\u00e9couvert Kobalos, un malware qui s\u2019attaque \u00e0 des clusters d\u2019ordinateurs haute performance (HPC). ESET a travaill\u00e9 avec l\u2019\u00e9quipe de s\u00e9curit\u00e9 informatique du CERN et d\u2019autres entreprises impliqu\u00e9es dans l\u2019att\u00e9nuation des attaques sur ces r\u00e9seaux de recherche scientifique. Un grand fournisseur d\u2019acc\u00e8s Internet asiatique, un prestataire nord-am\u00e9ricain de protection des terminaux, ainsi que plusieurs serveurs priv\u00e9s, font \u00e9galement partie des cibles.","og_url":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/37770\/","og_site_name":"EENewsEurope","article_published_time":"2021-02-12T08:31:44+00:00","og_image":[{"width":1117,"height":655,"url":"https:\/\/cdn.eenewseurope.com\/wp-content\/uploads\/import\/default\/files\/sites\/default\/files\/images\/eci9088_eset_actu.jpg","type":"image\/jpeg"}],"author":"Alain Dieul","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alain Dieul","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cdn.eenewseurope.com\/fr\/une-menace-linux-complexe-sattaquant-aux-supercalculateurs\/#article","isPartOf":{"@id":"https:\/\/cdn.eenewseurope.com\/fr\/une-menace-linux-complexe-sattaquant-aux-supercalculateurs\/"},"author":{"name":"Alain Dieul","@id":"https:\/\/www.eenewseurope.com\/fr\/#\/schema\/person\/568c789a4794bd460460501ba91f5daf"},"headline":"Une menace Linux complexe s\u2019attaquant aux supercalculateurs","datePublished":"2021-02-12T08:31:44+00:00","dateModified":"2021-02-12T08:31:44+00:00","mainEntityOfPage":{"@id":"https:\/\/cdn.eenewseurope.com\/fr\/une-menace-linux-complexe-sattaquant-aux-supercalculateurs\/"},"wordCount":516,"commentCount":0,"publisher":{"@id":"https:\/\/www.eenewseurope.com\/fr\/#organization"},"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cdn.eenewseurope.com\/fr\/une-menace-linux-complexe-sattaquant-aux-supercalculateurs\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cdn.eenewseurope.com\/fr\/une-menace-linux-complexe-sattaquant-aux-supercalculateurs\/","url":"https:\/\/cdn.eenewseurope.com\/fr\/une-menace-linux-complexe-sattaquant-aux-supercalculateurs\/","name":"Une menace Linux complexe s\u2019attaquant aux supercalculateurs -","isPartOf":{"@id":"https:\/\/www.eenewseurope.com\/fr\/#website"},"datePublished":"2021-02-12T08:31:44+00:00","dateModified":"2021-02-12T08:31:44+00:00","breadcrumb":{"@id":"https:\/\/cdn.eenewseurope.com\/fr\/une-menace-linux-complexe-sattaquant-aux-supercalculateurs\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cdn.eenewseurope.com\/fr\/une-menace-linux-complexe-sattaquant-aux-supercalculateurs\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cdn.eenewseurope.com\/fr\/une-menace-linux-complexe-sattaquant-aux-supercalculateurs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/test.eenewseurope.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Une menace Linux complexe s\u2019attaquant aux supercalculateurs"}]},{"@type":"WebSite","@id":"https:\/\/www.eenewseurope.com\/fr\/#website","url":"https:\/\/www.eenewseurope.com\/fr\/","name":"EENewsEurope","description":"Just another WordPress site","publisher":{"@id":"https:\/\/www.eenewseurope.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eenewseurope.com\/fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.eenewseurope.com\/fr\/#organization","name":"EENewsEurope","url":"https:\/\/www.eenewseurope.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.eenewseurope.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg","contentUrl":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg","width":283,"height":113,"caption":"EENewsEurope"},"image":{"@id":"https:\/\/www.eenewseurope.com\/fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eenewseurope.com\/fr\/#\/schema\/person\/568c789a4794bd460460501ba91f5daf","name":"Alain Dieul","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.eenewseurope.com\/fr\/#\/schema\/person\/image\/6d32dc651fbcef3b338066625b118364","url":"https:\/\/secure.gravatar.com\/avatar\/93708ec89b35deb10f4cfbfe144b4e07?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/93708ec89b35deb10f4cfbfe144b4e07?s=96&d=mm&r=g","caption":"Alain Dieul"}}]}},"authors":[{"term_id":1141,"user_id":9,"is_guest":0,"slug":"alaindieul","display_name":"Alain Dieul","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/93708ec89b35deb10f4cfbfe144b4e07?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/37770"}],"collection":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/comments?post=37770"}],"version-history":[{"count":0,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/37770\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/media\/160969"}],"wp:attachment":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/media?parent=37770"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/categories?post=37770"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/tags?post=37770"},{"taxonomy":"domains","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/domains?post=37770"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/ppma_author?post=37770"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}