{"id":78792,"date":"2019-08-12T13:44:57","date_gmt":"2019-08-12T13:44:57","guid":{"rendered":"https:\/\/\/cyberattaques-simulees-sur-un-plc-securise-siemens-simatic-s7\/"},"modified":"2019-08-12T13:44:57","modified_gmt":"2019-08-12T13:44:57","slug":"cyberattaques-simulees-sur-un-plc-securise-siemens-simatic-s7","status":"publish","type":"post","link":"https:\/\/www.ecinews.fr\/fr\/cyberattaques-simulees-sur-un-plc-securise-siemens-simatic-s7\/","title":{"rendered":"Cyberattaques simul\u00e9es sur un PLC s\u00e9curis\u00e9 Siemens Simatic S7"},"content":{"rendered":"<p><span class=\"tlid-translation translation\" lang=\"fr\">Des chercheurs de l&rsquo;Universit\u00e9 de Tel Aviv et du Technion Institute of Technology ont,&nbsp;dans le cadre de cyberattaques , d\u00e9couvert des vuln\u00e9rabilit\u00e9s critiques dans l&rsquo;automate programmable Siemens S7 Simatic, l&rsquo;un des automates r\u00e9put\u00e9 le plus s\u00e9curis\u00e9 au monde, .<\/span><\/p>\n<p><span class=\"tlid-translation translation\" lang=\"fr\">L\u2019\u00e9quipe a proc\u00e9d\u00e9 \u00e0 l\u2019ing\u00e9nierie inverse du protocole cryptographique propri\u00e9taire du S7, et a d\u00e9velopp\u00e9 un poste de travail d\u2019ing\u00e9nierie pirat\u00e9 qui se pr\u00e9sentait comme une station d\u2019ing\u00e9nierie dite TIA interfac\u00e9e avec le Simatic S7-1500. \u00ab\u00a0La station a \u00e9t\u00e9 en mesure de d\u00e9marrer et d\u2019arr\u00eater l\u2019API \u00e0 distance via l\u2019architecture de communication Siemens r\u00e9quisitionn\u00e9e, ce qui pourrait causer des ravages dans un processus industriel\u00a0\u00bb, a d\u00e9clar\u00e9 le professeur Avishai Wool de la facult\u00e9 de g\u00e9nie \u00e9lectrique de TAU. \u00ab\u00a0Nous avons ensuite pu extraire les codes de contr\u00f4le de la TIA et t\u00e9l\u00e9charger subrepticement la logique de commande pirate sur l&rsquo;automate S7-1500.\u00a0\u00bb<\/span><\/p>\n<p><span class=\"tlid-translation translation\" lang=\"fr\">Les chercheurs ont dissimul\u00e9 le code pirate dans l&rsquo;automate afin qu&rsquo;un ing\u00e9nieur de proc\u00e9d\u00e9 ne puisse pas le voir. Si l&rsquo;ing\u00e9nieur examinait le code de l&rsquo;automate, il ne verrait que le code source l\u00e9gitime de l&rsquo;automate, ignorant que le code malveillant s&rsquo;ex\u00e9cute en arri\u00e8re-plan et envoie des commandes pirate \u00e0 l&rsquo;automate.<\/span><\/p>\n<p><span class=\"tlid-translation translation\" lang=\"fr\">Leurs r\u00e9sultats d\u00e9montrent comment une cyberattaque sophistiqu\u00e9e peut acc\u00e9der \u00e0 la derni\u00e8re g\u00e9n\u00e9ration de contr\u00f4leurs industriels de Siemens, dot\u00e9s de fonctions de s\u00e9curit\u00e9 plus avanc\u00e9es et de protocoles de communication suppos\u00e9ment plus s\u00e9curis\u00e9s. Siemens a am\u00e9lior\u00e9 la s\u00e9curit\u00e9 de son syst\u00e8me de contr\u00f4le industriel (ICS) \u00e0 la suite de l&rsquo;attaque de Stuxnet en 2010, au cours de laquelle ses contr\u00f4leurs ont \u00e9t\u00e9 pris pour cible dans une cyberattaque sophistiqu\u00e9e qui a finalement permis de saboter des centrifugeuses dans l&rsquo;installation nucl\u00e9aire de Natanz en Iran.<\/span><\/p>\n<p><span class=\"tlid-translation translation\" lang=\"fr\">\u00ab\u00a0Il s&rsquo;agissait d&rsquo;un d\u00e9fi complexe en raison des am\u00e9liorations apport\u00e9es par Siemens aux nouvelles versions de contr\u00f4leurs Simatic\u00a0\u00bb, a d\u00e9clar\u00e9 le professeur Eli Biham au Technion. \u00ab\u00a0Notre succ\u00e8s est li\u00e9 \u00e0 notre vaste exp\u00e9rience dans l&rsquo;analyse et la s\u00e9curisation des contr\u00f4leurs et dans l&rsquo;int\u00e9gration de nos connaissances approfondies dans plusieurs domaines: compr\u00e9hension des syst\u00e8mes, ing\u00e9nierie inverse et cryptographie.\u00a0\u00bb<\/span><\/p>\n<p>A suivre: Investir contre les cyberattaques<\/p>\n<hr \/>\n<p>&nbsp; <span class=\"tlid-translation translation\" lang=\"fr\">Cette cyberattaque met en \u00e9vidence la n\u00e9cessit\u00e9 pour les fabricants et les clients d\u2019investir dans la s\u00e9curit\u00e9 des syst\u00e8mes de contr\u00f4le industriels. \u00ab\u00a0L&rsquo;attaque montre que la s\u00e9curisation des syst\u00e8mes de contr\u00f4le industriels est une t\u00e2che plus ardue que la s\u00e9curisation des syst\u00e8mes d&rsquo;information\u00a0\u00bb, a d\u00e9clar\u00e9 le professeur Biham.<\/span><\/p>\n<p><span class=\"tlid-translation translation\" lang=\"fr\">Conform\u00e9ment aux meilleures pratiques de divulgation responsable, les r\u00e9sultats de la recherche ont \u00e9t\u00e9 partag\u00e9s avec Siemens bien avant la pr\u00e9sentation pr\u00e9vue \u00e0 la convention Black Hat aux USA, permettant ainsi au fabricant de pr\u00e9parer des contre-mesures.<\/span><\/p>\n<p>\u00e0 lire \u00e9galement:<\/p>\n<p><a href=\"https:\/\/www.electronique-eci.com\/news\/comment-can-peut-offrir-une-cybersecurite-sans-cryptage\">Comment CAN peut offrir une cybers\u00e9curit\u00e9 sans cryptage<\/a><\/p>\n<p><a href=\"https:\/\/www.electronique-eci.com\/news\/microcontroleurs-32-bits-en-tres-petits-boitiers\">Microcontr\u00f4leurs 32 bits en tr\u00e8s petits bo\u00eetiers<\/a><\/p>\n<p><a href=\"http:\/\/www.aftau.org\/\" target=\"_blank\" rel=\"noopener\">www.aftau.org<\/a><\/p>\n<h3>Related cyberattack&nbsp;articles&nbsp;<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.eenewseurope.com\/news\/secure-wireless-environment-light-communication\">A SECURE WIRELESS ENVIRONMENT FOR LIGHT COMMUNICATION<\/a><\/li>\n<li><a href=\"https:\/\/www.eenewseurope.com\/news\/liverpool-cyber-attack-sparks-debate\">LIVERPOOL CYBER-ATTACK SPARKS DEBATE<\/a><\/li>\n<li><a href=\"https:\/\/www.eenewseurope.com\/news\/identifying-and-investigating-malicious-ip-addresses-and-domains\">IDENTIFYING AND INVESTIGATING MALICIOUS IP ADDRESSES AND DOMAINS<\/a><\/li>\n<li><a href=\"https:\/\/www.eenewseurope.com\/news\/ai-driven-digital-twin-speeds-cyber-defense-control-systems\">AI-DRIVEN DIGITAL TWIN SPEEDS UP CYBER-DEFENSE FOR CONTROL SYSTEMS<\/a><\/li>\n<\/ul>\n<section id=\"block-system-main\">&nbsp;<\/section>\n","protected":false},"excerpt":{"rendered":"<p>L&rsquo;un des automates programmables les plus s\u00e9curis\u00e9s au monde, le Siemens S7 Simatic, a \u00e9t\u00e9 compromis lors d&rsquo;une cyberattaque<\/p>\n","protected":false},"author":22,"featured_media":78793,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[],"tags":[893,919,917],"domains":[47],"ppma_author":[1149],"class_list":["post-78792","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","tag-authentication-encryption-fr","tag-iot-fr","tag-software-embedded-tools-fr","domains-electronique-eci"],"acf":[],"yoast_head":"<title>Cyberattaques simul\u00e9es sur un PLC s\u00e9curis\u00e9 Siemens Simatic S7 ...<\/title>\n<meta name=\"description\" content=\"L&#039;un des automates programmables les plus s\u00e9curis\u00e9s au monde, le Siemens S7 Simatic, a \u00e9t\u00e9 compromis lors d&#039;une cyberattaque\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/78792\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberattaques simul\u00e9es sur un PLC s\u00e9curis\u00e9 Siemens Simatic S7\" \/>\n<meta property=\"og:description\" content=\"L&#039;un des automates programmables les plus s\u00e9curis\u00e9s au monde, le Siemens S7 Simatic, a \u00e9t\u00e9 compromis lors d&#039;une cyberattaque\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/78792\/\" \/>\n<meta property=\"og:site_name\" content=\"EENewsEurope\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-12T13:44:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eenewseurope.com\/wp-content\/uploads\/import\/default\/files\/sites\/default\/files\/images\/siemens_simatic_plc.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"eeNews Europe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"eeNews Europe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.eenewseurope.com\/fr\/cyberattaques-simulees-sur-un-plc-securise-siemens-simatic-s7\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.eenewseurope.com\/fr\/cyberattaques-simulees-sur-un-plc-securise-siemens-simatic-s7\/\"},\"author\":{\"name\":\"eeNews Europe\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/9eff4051fa9dac8230052de45e32b0f4\"},\"headline\":\"Cyberattaques simul\u00e9es sur un PLC s\u00e9curis\u00e9 Siemens Simatic S7\",\"datePublished\":\"2019-08-12T13:44:57+00:00\",\"dateModified\":\"2019-08-12T13:44:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.eenewseurope.com\/fr\/cyberattaques-simulees-sur-un-plc-securise-siemens-simatic-s7\/\"},\"wordCount\":593,\"publisher\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#organization\"},\"keywords\":[\"Authentication &amp; Encryption\",\"IoT\",\"Software &amp; Embedded tools\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.eenewseurope.com\/fr\/cyberattaques-simulees-sur-un-plc-securise-siemens-simatic-s7\/\",\"url\":\"https:\/\/www.eenewseurope.com\/fr\/cyberattaques-simulees-sur-un-plc-securise-siemens-simatic-s7\/\",\"name\":\"Cyberattaques simul\u00e9es sur un PLC s\u00e9curis\u00e9 Siemens Simatic S7 -\",\"isPartOf\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#website\"},\"datePublished\":\"2019-08-12T13:44:57+00:00\",\"dateModified\":\"2019-08-12T13:44:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.eenewseurope.com\/fr\/cyberattaques-simulees-sur-un-plc-securise-siemens-simatic-s7\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.eenewseurope.com\/fr\/cyberattaques-simulees-sur-un-plc-securise-siemens-simatic-s7\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.eenewseurope.com\/fr\/cyberattaques-simulees-sur-un-plc-securise-siemens-simatic-s7\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ecinews.fr\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyberattaques simul\u00e9es sur un PLC s\u00e9curis\u00e9 Siemens Simatic S7\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#website\",\"url\":\"https:\/\/www.eenewseurope.com\/en\/\",\"name\":\"EENewsEurope\",\"description\":\"Just another WordPress site\",\"publisher\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.eenewseurope.com\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#organization\",\"name\":\"EENewsEurope\",\"url\":\"https:\/\/www.eenewseurope.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg\",\"contentUrl\":\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg\",\"width\":283,\"height\":113,\"caption\":\"EENewsEurope\"},\"image\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/9eff4051fa9dac8230052de45e32b0f4\",\"name\":\"eeNews Europe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/image\/fae8f0cb15861c4ae0ed4872e2c9fc22\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5081509054e28b04ecd976976e723ce0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5081509054e28b04ecd976976e723ce0?s=96&d=mm&r=g\",\"caption\":\"eeNews Europe\"}}]}<\/script>","yoast_head_json":{"title":"Cyberattaques simul\u00e9es sur un PLC s\u00e9curis\u00e9 Siemens Simatic S7 ...","description":"L'un des automates programmables les plus s\u00e9curis\u00e9s au monde, le Siemens S7 Simatic, a \u00e9t\u00e9 compromis lors d'une cyberattaque","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/78792\/","og_locale":"fr_FR","og_type":"article","og_title":"Cyberattaques simul\u00e9es sur un PLC s\u00e9curis\u00e9 Siemens Simatic S7","og_description":"L'un des automates programmables les plus s\u00e9curis\u00e9s au monde, le Siemens S7 Simatic, a \u00e9t\u00e9 compromis lors d'une cyberattaque","og_url":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/78792\/","og_site_name":"EENewsEurope","article_published_time":"2019-08-12T13:44:57+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.eenewseurope.com\/wp-content\/uploads\/import\/default\/files\/sites\/default\/files\/images\/siemens_simatic_plc.jpg","type":"image\/jpeg"}],"author":"eeNews Europe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"eeNews Europe","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eenewseurope.com\/fr\/cyberattaques-simulees-sur-un-plc-securise-siemens-simatic-s7\/#article","isPartOf":{"@id":"https:\/\/www.eenewseurope.com\/fr\/cyberattaques-simulees-sur-un-plc-securise-siemens-simatic-s7\/"},"author":{"name":"eeNews Europe","@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/9eff4051fa9dac8230052de45e32b0f4"},"headline":"Cyberattaques simul\u00e9es sur un PLC s\u00e9curis\u00e9 Siemens Simatic S7","datePublished":"2019-08-12T13:44:57+00:00","dateModified":"2019-08-12T13:44:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eenewseurope.com\/fr\/cyberattaques-simulees-sur-un-plc-securise-siemens-simatic-s7\/"},"wordCount":593,"publisher":{"@id":"https:\/\/www.eenewseurope.com\/en\/#organization"},"keywords":["Authentication &amp; Encryption","IoT","Software &amp; Embedded tools"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.eenewseurope.com\/fr\/cyberattaques-simulees-sur-un-plc-securise-siemens-simatic-s7\/","url":"https:\/\/www.eenewseurope.com\/fr\/cyberattaques-simulees-sur-un-plc-securise-siemens-simatic-s7\/","name":"Cyberattaques simul\u00e9es sur un PLC s\u00e9curis\u00e9 Siemens Simatic S7 -","isPartOf":{"@id":"https:\/\/www.eenewseurope.com\/en\/#website"},"datePublished":"2019-08-12T13:44:57+00:00","dateModified":"2019-08-12T13:44:57+00:00","breadcrumb":{"@id":"https:\/\/www.eenewseurope.com\/fr\/cyberattaques-simulees-sur-un-plc-securise-siemens-simatic-s7\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eenewseurope.com\/fr\/cyberattaques-simulees-sur-un-plc-securise-siemens-simatic-s7\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.eenewseurope.com\/fr\/cyberattaques-simulees-sur-un-plc-securise-siemens-simatic-s7\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ecinews.fr\/fr\/"},{"@type":"ListItem","position":2,"name":"Cyberattaques simul\u00e9es sur un PLC s\u00e9curis\u00e9 Siemens Simatic S7"}]},{"@type":"WebSite","@id":"https:\/\/www.eenewseurope.com\/en\/#website","url":"https:\/\/www.eenewseurope.com\/en\/","name":"EENewsEurope","description":"Just another WordPress site","publisher":{"@id":"https:\/\/www.eenewseurope.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eenewseurope.com\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.eenewseurope.com\/en\/#organization","name":"EENewsEurope","url":"https:\/\/www.eenewseurope.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg","contentUrl":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg","width":283,"height":113,"caption":"EENewsEurope"},"image":{"@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/9eff4051fa9dac8230052de45e32b0f4","name":"eeNews Europe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/image\/fae8f0cb15861c4ae0ed4872e2c9fc22","url":"https:\/\/secure.gravatar.com\/avatar\/5081509054e28b04ecd976976e723ce0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5081509054e28b04ecd976976e723ce0?s=96&d=mm&r=g","caption":"eeNews Europe"}}]}},"authors":[{"term_id":1149,"user_id":22,"is_guest":0,"slug":"eenews-europe","display_name":"eeNews Europe","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/5081509054e28b04ecd976976e723ce0?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/78792"}],"collection":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/comments?post=78792"}],"version-history":[{"count":0,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/78792\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/media\/78793"}],"wp:attachment":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/media?parent=78792"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/categories?post=78792"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/tags?post=78792"},{"taxonomy":"domains","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/domains?post=78792"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/ppma_author?post=78792"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}