{"id":46046,"date":"2020-09-08T20:31:44","date_gmt":"2020-09-08T20:31:44","guid":{"rendered":"https:\/\/\/eset-research-decouvre-kryptocibule-un-voleur-de-cryptomonnaies-multitache\/"},"modified":"2020-09-08T20:31:44","modified_gmt":"2020-09-08T20:31:44","slug":"eset-research-decouvre-kryptocibule-un-voleur-de-cryptomonnaies-multitache","status":"publish","type":"post","link":"https:\/\/www.ecinews.fr\/fr\/eset-research-decouvre-kryptocibule-un-voleur-de-cryptomonnaies-multitache\/","title":{"rendered":"ESET Research d\u00e9couvre KryptoCibule : un voleur de cryptomonnaies multit\u00e2che"},"content":{"rendered":"<p>Ce&nbsp;<a href=\"http:\/\/web-engage.augure.com\/pub\/tracking\/633359\/04606026974368871599118435788-hl-com.com?id1=aHR0cHMlM0ElMkYlMkZ3d3cuZXNldC5jb20lMkZmciUyRm1hbHdhcmUlMkYlM0Z1dG1fc291cmNl%0AJTNEaGxjb20lMjZhbXAlM0J1dG1fbWVkaXVtJTNEZW1haWwlMjZhbXAlM0J1dG1fY2FtcGFpZ24l%0AM0RjcGFtcGxpZmljYXRpb24lMjZhbXAlM0J1dG1fY29udGVudCUzRGVzZXQtbW9iaWxlLXNlY3Vy%0AaXR5LXJlY29ubnUtbWVpbGxldXItbG9naWNpZWwtYW5kcm9pZA%3D%3D\">malware<\/a>&nbsp;est une triple menace en ce qui concerne les cryptomonnaies. Il utilise les ressources de la victime pour miner des cryptomonnaies, tente de d\u00e9tourner des transactions en rempla\u00e7ant les adresses des portefeuilles dans le presse-papiers, et exfiltre des fichiers li\u00e9s aux cryptomonnaies, tout en d\u00e9ployant de multiples techniques pour \u00e9viter d\u2019\u00eatre d\u00e9tect\u00e9. KryptoCibule utilise largement le r\u00e9seau Tor et le protocole BitTorrent dans son infrastructure de communication.<\/p>\n<p>\u00ab&nbsp;Le malware, tel qu\u2019il a \u00e9t\u00e9 d\u00e9velopp\u00e9, utilise des logiciels l\u00e9gitimes. Certains d\u2019entre eux, tels que Tor et le client de torrents Transmission, sont fournis avec le programme d\u2019installation&nbsp;; d\u2019autres sont t\u00e9l\u00e9charg\u00e9s au moment de l\u2019ex\u00e9cution, notamment les serveurs Apache httpd et SFTP Buru,&nbsp;\u00bb explique Matthieu Faou, le chercheur d\u2019ESET qui a d\u00e9couvert la nouvelle famille de malwares.<\/p>\n<p>ESET a identifi\u00e9 plusieurs versions de KryptoCibule, qui sont encore actives, ce qui nous a permis de retracer leurs d\u00e9buts \u00e0 d\u00e9cembre 2018. De nouvelles fonctionnalit\u00e9s ont \u00e9t\u00e9 r\u00e9guli\u00e8rement ajout\u00e9es au malware au cours de sa constante \u00e9volution.<\/p>\n<p>La plupart des victimes sont situ\u00e9es en R\u00e9publique tch\u00e8que et en Slovaquie, ce qui refl\u00e8te la base d\u2019utilisateurs du site qui h\u00e9berge les torrents infect\u00e9s. Presque tous les torrents malveillants \u00e9taient disponibles sur uloz.to, un site de partage de fichiers tr\u00e8s populaire dans les deux pays. KryptoCibule recherche \u00e9galement sp\u00e9cifiquement la pr\u00e9sence des produits de s\u00e9curit\u00e9 pour terminaux&nbsp;: ESET, Avast et AVG. ESET a son si\u00e8ge en Slovaquie, tandis que les deux autres sont d\u00e9tenus par Avast, dont le si\u00e8ge est situ\u00e9 en R\u00e9publique tch\u00e8que.<\/p>\n<p>\u00ab&nbsp;KryptoCibule poss\u00e8de trois composants qui exploitent les h\u00f4tes infect\u00e9s afin d\u2019obtenir de la cryptomonnaie&nbsp;:&nbsp;<a href=\"http:\/\/web-engage.augure.com\/pub\/tracking\/633359\/04606026974368871599118435788-hl-com.com?id1=aHR0cHMlM0ElMkYlMkZ3d3cuZXNldC5jb20lMkZmciUyRmJ1c2luZXNzJTJGZW5kcG9pbnQtc2Vj%0AdXJpdHklMkZlbmNyeXB0aW9uJTJGJTNGdXRtX3NvdXJjZSUzRGhsY29tJTI2YW1wJTNCdXRtX21l%0AZGl1bSUzRGVtYWlsJTI2YW1wJTNCdXRtX2NhbXBhaWduJTNEY3BhbXBsaWZpY2F0aW9uJTI2YW1w%0AJTNCdXRtX2NvbnRlbnQlM0Rlc2V0LW1vYmlsZS1zZWN1cml0eS1yZWNvbm51LW1laWxsZXVyLWxv%0AZ2ljaWVsLWFuZHJvaWQ%3D\">chiffrement<\/a>, d\u00e9tournement du presse-papiers et exfiltration de fichiers,&nbsp;\u00bb poursuit M. Faou. \u00ab&nbsp;On peut supposer que les op\u00e9rateurs du malware ont r\u00e9ussi \u00e0 gagner plus d\u2019argent en volant des portefeuilles et en extrayant des cryptomonnaies que ce que nous avons trouv\u00e9 dans les portefeuilles utilis\u00e9s par le composant de d\u00e9tournement du presse-papiers. \u00c0 lui seul, le revenu g\u00e9n\u00e9r\u00e9 par ce composant ne semble pas suffisant pour justifier l\u2019effort de d\u00e9veloppement observ\u00e9.&nbsp;\u00bb<\/p>\n<p><strong><u>\u00c0 propos d&rsquo;ESET<\/u><\/strong><br \/>\nSp\u00e9cialis\u00e9 dans la conception et le d\u00e9veloppement de logiciels de s\u00e9curit\u00e9 pour les entreprises et le grand public, ESET est aujourd\u2019hui le 1er \u00e9diteur de l\u2019Union europ\u00e9enne en mati\u00e8re de s\u00e9curit\u00e9 des endpoints. Pionnier en mati\u00e8re de d\u00e9tection proactive, ESET a \u00e9t\u00e9 d\u00e9sign\u00e9 pour la 2\u00e8me ann\u00e9e cons\u00e9cutive, unique Challenger dans le Gartner Magic Quadrant 2019*, \u00ab\u202fEndpoint Protection \u00bb apr\u00e8s avoir \u00e9t\u00e9 \u00e9valu\u00e9 sur sa performance et sur la qualit\u00e9 de sa vision dans le domaine de la protection des&nbsp;Endpoints. \u00c0 ce jour, l\u2019antivirus ESET NOD32 d\u00e9tient le record mondial de r\u00e9compenses d\u00e9cern\u00e9es par le laboratoire ind\u00e9pendant Virus Bulletin depuis 1998. La technologie ESET prot\u00e8ge aujourd\u2019hui plus d\u2019un milliard d\u2019internautes.&nbsp;<\/p>\n<p>*Source\u202f: Gartner Inc, Magic Quadrant for Endpoint Protection Platforms, Peter Firstbrook, Lawrence Pingree, Dionisio Zumerle, Prateek Bhajanka, Paul Webber, August 20, 2019.<\/p>\n<p><a href=\"http:\/\/web-engage.augure.com\/pub\/tracking\/633359\/04606026974368871599118435788-hl-com.com?id1=aHR0cHMlM0ElMkYlMkZ3d3cuZXNldC5jb20lMkZmciUyRiUzRnV0bV9zb3VyY2UlM0RobGNvbSUy%0ANmFtcCUzQnV0bV9tZWRpdW0lM0RlbWFpbCUyNmFtcCUzQnV0bV9jYW1wYWlnbiUzRGNwYW1wbGlm%0AaWNhdGlvbiUyNmFtcCUzQnV0bV9jb250ZW50JTNEZXNldC1tb2JpbGUtc2VjdXJpdHktcmVjb25u%0AdS1tZWlsbGV1ci1sb2dpY2llbC1hbmRyb2lk%20\\t%20_blank\">www.eset.com\/fr\/<\/a>&nbsp;<\/p>\n<p><a href=\"http:\/\/www.welivesecurity.com\/fr\">www.welivesecurity.com\/fr<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les chercheurs d\u2019ESET, 1er \u00e9diteur Europ\u00e9en de solutions de s\u00e9curit\u00e9, ont d\u00e9couvert une famille de malwares de type cheval de Troie, jusqu\u2019alors inconnue, qui se r\u00e9pand via des torrents malveillants et qui utilise plusieurs ruses pour voler autant de cryptomonnaie que possible aupr\u00e8s de ses victimes, tout en \u00e9chappant \u00e0 la d\u00e9tection. ESET a nomm\u00e9 la menace KryptoCibule, et selon la t\u00e9l\u00e9m\u00e9trie d\u2019ESET, le malware semble cibler principalement des utilisateurs en R\u00e9publique tch\u00e8que et en Slovaquie.<\/p>\n","protected":false},"author":9,"featured_media":46047,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[881],"tags":[],"domains":[47],"ppma_author":[1141],"class_list":["post-46046","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-nouveaux-produits","domains-electronique-eci"],"acf":[],"yoast_head":"<title>ESET Research d\u00e9couvre KryptoCibule : un voleur de cryptomonna...<\/title>\n<meta name=\"description\" content=\"Les chercheurs d\u2019ESET, 1er \u00e9diteur Europ\u00e9en de solutions de s\u00e9curit\u00e9, ont d\u00e9couvert une famille de malwares de type cheval de Troie, jusqu\u2019alors...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/46046\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ESET Research d\u00e9couvre KryptoCibule : un voleur de cryptomonnaies multit\u00e2che\" \/>\n<meta property=\"og:description\" content=\"Les chercheurs d\u2019ESET, 1er \u00e9diteur Europ\u00e9en de solutions de s\u00e9curit\u00e9, ont d\u00e9couvert une famille de malwares de type cheval de Troie, jusqu\u2019alors inconnue, qui se r\u00e9pand via des torrents malveillants et qui utilise plusieurs ruses pour voler autant de cryptomonnaie que possible aupr\u00e8s de ses victimes, tout en \u00e9chappant \u00e0 la d\u00e9tection. ESET a nomm\u00e9 la menace KryptoCibule, et selon la t\u00e9l\u00e9m\u00e9trie d\u2019ESET, le malware semble cibler principalement des utilisateurs en R\u00e9publique tch\u00e8que et en Slovaquie.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/46046\/\" \/>\n<meta property=\"og:site_name\" content=\"EENewsEurope\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-08T20:31:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/import\/default\/files\/sites\/default\/files\/images\/eci8793_eset_research.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"811\" \/>\n\t<meta property=\"og:image:height\" content=\"606\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alain Dieul\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alain Dieul\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/eset-research-decouvre-kryptocibule-un-voleur-de-cryptomonnaies-multitache\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/eset-research-decouvre-kryptocibule-un-voleur-de-cryptomonnaies-multitache\/\"},\"author\":{\"name\":\"Alain Dieul\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/568c789a4794bd460460501ba91f5daf\"},\"headline\":\"ESET Research d\u00e9couvre KryptoCibule : un voleur de cryptomonnaies multit\u00e2che\",\"datePublished\":\"2020-09-08T20:31:44+00:00\",\"dateModified\":\"2020-09-08T20:31:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/eset-research-decouvre-kryptocibule-un-voleur-de-cryptomonnaies-multitache\/\"},\"wordCount\":575,\"publisher\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#organization\"},\"articleSection\":[\"Nouveaux produits\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/eset-research-decouvre-kryptocibule-un-voleur-de-cryptomonnaies-multitache\/\",\"url\":\"https:\/\/www.ecinews.fr\/fr\/eset-research-decouvre-kryptocibule-un-voleur-de-cryptomonnaies-multitache\/\",\"name\":\"ESET Research d\u00e9couvre KryptoCibule : un voleur de cryptomonnaies multit\u00e2che -\",\"isPartOf\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#website\"},\"datePublished\":\"2020-09-08T20:31:44+00:00\",\"dateModified\":\"2020-09-08T20:31:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/eset-research-decouvre-kryptocibule-un-voleur-de-cryptomonnaies-multitache\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ecinews.fr\/fr\/eset-research-decouvre-kryptocibule-un-voleur-de-cryptomonnaies-multitache\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/eset-research-decouvre-kryptocibule-un-voleur-de-cryptomonnaies-multitache\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ecinews.fr\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ESET Research d\u00e9couvre KryptoCibule : un voleur de cryptomonnaies multit\u00e2che\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#website\",\"url\":\"https:\/\/www.ecinews.fr\/fr\/\",\"name\":\"EENewsEurope\",\"description\":\"Just another WordPress site\",\"publisher\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ecinews.fr\/fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#organization\",\"name\":\"EENewsEurope\",\"url\":\"https:\/\/www.ecinews.fr\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg\",\"contentUrl\":\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg\",\"width\":283,\"height\":113,\"caption\":\"EENewsEurope\"},\"image\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/568c789a4794bd460460501ba91f5daf\",\"name\":\"Alain Dieul\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/image\/6d32dc651fbcef3b338066625b118364\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/93708ec89b35deb10f4cfbfe144b4e07?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/93708ec89b35deb10f4cfbfe144b4e07?s=96&d=mm&r=g\",\"caption\":\"Alain Dieul\"}}]}<\/script>","yoast_head_json":{"title":"ESET Research d\u00e9couvre KryptoCibule : un voleur de cryptomonna...","description":"Les chercheurs d\u2019ESET, 1er \u00e9diteur Europ\u00e9en de solutions de s\u00e9curit\u00e9, ont d\u00e9couvert une famille de malwares de type cheval de Troie, jusqu\u2019alors...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/46046\/","og_locale":"fr_FR","og_type":"article","og_title":"ESET Research d\u00e9couvre KryptoCibule : un voleur de cryptomonnaies multit\u00e2che","og_description":"Les chercheurs d\u2019ESET, 1er \u00e9diteur Europ\u00e9en de solutions de s\u00e9curit\u00e9, ont d\u00e9couvert une famille de malwares de type cheval de Troie, jusqu\u2019alors inconnue, qui se r\u00e9pand via des torrents malveillants et qui utilise plusieurs ruses pour voler autant de cryptomonnaie que possible aupr\u00e8s de ses victimes, tout en \u00e9chappant \u00e0 la d\u00e9tection. ESET a nomm\u00e9 la menace KryptoCibule, et selon la t\u00e9l\u00e9m\u00e9trie d\u2019ESET, le malware semble cibler principalement des utilisateurs en R\u00e9publique tch\u00e8que et en Slovaquie.","og_url":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/46046\/","og_site_name":"EENewsEurope","article_published_time":"2020-09-08T20:31:44+00:00","og_image":[{"width":811,"height":606,"url":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/import\/default\/files\/sites\/default\/files\/images\/eci8793_eset_research.jpg","type":"image\/jpeg"}],"author":"Alain Dieul","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alain Dieul","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ecinews.fr\/fr\/eset-research-decouvre-kryptocibule-un-voleur-de-cryptomonnaies-multitache\/#article","isPartOf":{"@id":"https:\/\/www.ecinews.fr\/fr\/eset-research-decouvre-kryptocibule-un-voleur-de-cryptomonnaies-multitache\/"},"author":{"name":"Alain Dieul","@id":"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/568c789a4794bd460460501ba91f5daf"},"headline":"ESET Research d\u00e9couvre KryptoCibule : un voleur de cryptomonnaies multit\u00e2che","datePublished":"2020-09-08T20:31:44+00:00","dateModified":"2020-09-08T20:31:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ecinews.fr\/fr\/eset-research-decouvre-kryptocibule-un-voleur-de-cryptomonnaies-multitache\/"},"wordCount":575,"publisher":{"@id":"https:\/\/www.ecinews.fr\/fr\/#organization"},"articleSection":["Nouveaux produits"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.ecinews.fr\/fr\/eset-research-decouvre-kryptocibule-un-voleur-de-cryptomonnaies-multitache\/","url":"https:\/\/www.ecinews.fr\/fr\/eset-research-decouvre-kryptocibule-un-voleur-de-cryptomonnaies-multitache\/","name":"ESET Research d\u00e9couvre KryptoCibule : un voleur de cryptomonnaies multit\u00e2che -","isPartOf":{"@id":"https:\/\/www.ecinews.fr\/fr\/#website"},"datePublished":"2020-09-08T20:31:44+00:00","dateModified":"2020-09-08T20:31:44+00:00","breadcrumb":{"@id":"https:\/\/www.ecinews.fr\/fr\/eset-research-decouvre-kryptocibule-un-voleur-de-cryptomonnaies-multitache\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ecinews.fr\/fr\/eset-research-decouvre-kryptocibule-un-voleur-de-cryptomonnaies-multitache\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ecinews.fr\/fr\/eset-research-decouvre-kryptocibule-un-voleur-de-cryptomonnaies-multitache\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ecinews.fr\/fr\/"},{"@type":"ListItem","position":2,"name":"ESET Research d\u00e9couvre KryptoCibule : un voleur de cryptomonnaies multit\u00e2che"}]},{"@type":"WebSite","@id":"https:\/\/www.ecinews.fr\/fr\/#website","url":"https:\/\/www.ecinews.fr\/fr\/","name":"EENewsEurope","description":"Just another WordPress site","publisher":{"@id":"https:\/\/www.ecinews.fr\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ecinews.fr\/fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.ecinews.fr\/fr\/#organization","name":"EENewsEurope","url":"https:\/\/www.ecinews.fr\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.ecinews.fr\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg","contentUrl":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg","width":283,"height":113,"caption":"EENewsEurope"},"image":{"@id":"https:\/\/www.ecinews.fr\/fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/568c789a4794bd460460501ba91f5daf","name":"Alain Dieul","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/image\/6d32dc651fbcef3b338066625b118364","url":"https:\/\/secure.gravatar.com\/avatar\/93708ec89b35deb10f4cfbfe144b4e07?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/93708ec89b35deb10f4cfbfe144b4e07?s=96&d=mm&r=g","caption":"Alain Dieul"}}]}},"authors":[{"term_id":1141,"user_id":9,"is_guest":0,"slug":"alaindieul","display_name":"Alain Dieul","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/93708ec89b35deb10f4cfbfe144b4e07?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/46046"}],"collection":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/comments?post=46046"}],"version-history":[{"count":0,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/46046\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/media\/46047"}],"wp:attachment":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/media?parent=46046"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/categories?post=46046"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/tags?post=46046"},{"taxonomy":"domains","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/domains?post=46046"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/ppma_author?post=46046"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}