{"id":3250,"date":"2025-05-30T14:08:51","date_gmt":"2025-05-30T12:08:51","guid":{"rendered":"https:\/\/www.r2ie.org\/index.php\/2025\/05\/30\/les-menaces-cyber-de-la-coree-du-nord\/"},"modified":"2025-05-30T14:08:51","modified_gmt":"2025-05-30T12:08:51","slug":"les-menaces-cyber-de-la-coree-du-nord","status":"publish","type":"post","link":"https:\/\/www.r2ie.org\/index.php\/2025\/05\/30\/les-menaces-cyber-de-la-coree-du-nord\/","title":{"rendered":"Les menaces cyber de la Cor\u00e9e du Nord"},"content":{"rendered":"<p>Le 21 f\u00e9vrier 2025, la plateforme d\u2019\u00e9change Bybit a \u00e9t\u00e9 victime de l&rsquo;un des vols les plus importants de crypto actifs de l\u2019histoire. Ce vol de 1,5 milliards de dollars a \u00e9t\u00e9 perp\u00e9tr\u00e9 par le groupe nord-cor\u00e9en Lazarus. Un \u00e9v\u00e9nement illustrant parfaitement la strat\u00e9gie offensive de la Cor\u00e9e du Nord, qui utilise le piratage pour financer ses ambitions. Il s\u2019inscrit dans une s\u00e9rie d\u2019op\u00e9rations de d\u00e9stabilisation et de vols contre des gouvernements adverses.<br \/>\nL\u2019article Les menaces cyber de la Cor\u00e9e du Nord est apparu en premier sur Portail de l&rsquo;IE.\u00a0<a href=\"https:\/\/www.portail-ie.fr\/univers\/2025\/les-menaces-cyber-de-la-coree-du-nord\/\" target=\"_blank\" class=\"feedzy-rss-link-icon\">Read More<\/a>\u00a0Portail de l&rsquo;IE\u00a0<\/p>\n<p>\u200b\u00a0\u00a0<\/p>\n<p>\u00a0<\/p>","protected":false},"excerpt":{"rendered":"<p>Le 21 f\u00e9vrier 2025, la plateforme d\u2019\u00e9change Bybit a \u00e9t\u00e9 victime de l&rsquo;un des vols les plus importants de crypto actifs de l\u2019histoire. Ce vol de 1,5 milliards de dollars a \u00e9t\u00e9 perp\u00e9tr\u00e9 par le groupe nord-cor\u00e9en Lazarus. Un \u00e9v\u00e9nement illustrant parfaitement la strat\u00e9gie offensive de la Cor\u00e9e du Nord, qui utilise le piratage pour&#8230;<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"footnotes":""},"categories":[12],"tags":[],"class_list":["post-3250","post","type-post","status-publish","format-standard","hentry","category-portail-de-lintelligence-economique"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Les menaces cyber de la Cor\u00e9e du Nord - Revue Internationale d&#039;Intelligence Economique<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.r2ie.org\/index.php\/2025\/05\/30\/les-menaces-cyber-de-la-coree-du-nord\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les menaces cyber de la Cor\u00e9e du Nord - Revue Internationale d&#039;Intelligence Economique\" \/>\n<meta property=\"og:description\" content=\"Le 21 f\u00e9vrier 2025, la plateforme d\u2019\u00e9change Bybit a \u00e9t\u00e9 victime de l&rsquo;un des vols les plus importants de crypto actifs de l\u2019histoire. Ce vol de 1,5 milliards de dollars a \u00e9t\u00e9 perp\u00e9tr\u00e9 par le groupe nord-cor\u00e9en Lazarus. Un \u00e9v\u00e9nement illustrant parfaitement la strat\u00e9gie offensive de la Cor\u00e9e du Nord, qui utilise le piratage pour...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.r2ie.org\/index.php\/2025\/05\/30\/les-menaces-cyber-de-la-coree-du-nord\/\" \/>\n<meta property=\"og:site_name\" content=\"Revue Internationale d&#039;Intelligence Economique\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-30T12:08:51+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.r2ie.org\/index.php\/2025\/05\/30\/les-menaces-cyber-de-la-coree-du-nord\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.r2ie.org\/index.php\/2025\/05\/30\/les-menaces-cyber-de-la-coree-du-nord\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Les menaces cyber de la Cor\u00e9e du Nord\",\"datePublished\":\"2025-05-30T12:08:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.r2ie.org\/index.php\/2025\/05\/30\/les-menaces-cyber-de-la-coree-du-nord\/\"},\"wordCount\":116,\"publisher\":{\"@id\":\"https:\/\/www.r2ie.org\/#organization\"},\"articleSection\":[\"Portail de l'intelligence \u00e9conomique\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.r2ie.org\/index.php\/2025\/05\/30\/les-menaces-cyber-de-la-coree-du-nord\/\",\"url\":\"https:\/\/www.r2ie.org\/index.php\/2025\/05\/30\/les-menaces-cyber-de-la-coree-du-nord\/\",\"name\":\"Les menaces cyber de la Cor\u00e9e du Nord - Revue Internationale d&#039;Intelligence Economique\",\"isPartOf\":{\"@id\":\"https:\/\/www.r2ie.org\/#website\"},\"datePublished\":\"2025-05-30T12:08:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.r2ie.org\/index.php\/2025\/05\/30\/les-menaces-cyber-de-la-coree-du-nord\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.r2ie.org\/index.php\/2025\/05\/30\/les-menaces-cyber-de-la-coree-du-nord\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.r2ie.org\/index.php\/2025\/05\/30\/les-menaces-cyber-de-la-coree-du-nord\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.r2ie.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Les menaces cyber de la Cor\u00e9e du Nord\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.r2ie.org\/#website\",\"url\":\"https:\/\/www.r2ie.org\/\",\"name\":\"Revue Internationale d&#039;Intelligence Economique\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.r2ie.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.r2ie.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.r2ie.org\/#organization\",\"name\":\"Revue Internationale d&#039;Intelligence Economique\",\"url\":\"https:\/\/www.r2ie.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.r2ie.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.r2ie.org\/wp-content\/uploads\/2023\/01\/cropped-cropped-logo-r2ie-dc3a9gradc3a9.webp\",\"contentUrl\":\"https:\/\/www.r2ie.org\/wp-content\/uploads\/2023\/01\/cropped-cropped-logo-r2ie-dc3a9gradc3a9.webp\",\"width\":654,\"height\":251,\"caption\":\"Revue Internationale d&#039;Intelligence Economique\"},\"image\":{\"@id\":\"https:\/\/www.r2ie.org\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Les menaces cyber de la Cor\u00e9e du Nord - Revue Internationale d&#039;Intelligence Economique","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.r2ie.org\/index.php\/2025\/05\/30\/les-menaces-cyber-de-la-coree-du-nord\/","og_locale":"fr_FR","og_type":"article","og_title":"Les menaces cyber de la Cor\u00e9e du Nord - Revue Internationale d&#039;Intelligence Economique","og_description":"Le 21 f\u00e9vrier 2025, la plateforme d\u2019\u00e9change Bybit a \u00e9t\u00e9 victime de l&rsquo;un des vols les plus importants de crypto actifs de l\u2019histoire. Ce vol de 1,5 milliards de dollars a \u00e9t\u00e9 perp\u00e9tr\u00e9 par le groupe nord-cor\u00e9en Lazarus. Un \u00e9v\u00e9nement illustrant parfaitement la strat\u00e9gie offensive de la Cor\u00e9e du Nord, qui utilise le piratage pour...","og_url":"https:\/\/www.r2ie.org\/index.php\/2025\/05\/30\/les-menaces-cyber-de-la-coree-du-nord\/","og_site_name":"Revue Internationale d&#039;Intelligence Economique","article_published_time":"2025-05-30T12:08:51+00:00","twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.r2ie.org\/index.php\/2025\/05\/30\/les-menaces-cyber-de-la-coree-du-nord\/#article","isPartOf":{"@id":"https:\/\/www.r2ie.org\/index.php\/2025\/05\/30\/les-menaces-cyber-de-la-coree-du-nord\/"},"author":{"name":"","@id":""},"headline":"Les menaces cyber de la Cor\u00e9e du Nord","datePublished":"2025-05-30T12:08:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.r2ie.org\/index.php\/2025\/05\/30\/les-menaces-cyber-de-la-coree-du-nord\/"},"wordCount":116,"publisher":{"@id":"https:\/\/www.r2ie.org\/#organization"},"articleSection":["Portail de l'intelligence \u00e9conomique"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.r2ie.org\/index.php\/2025\/05\/30\/les-menaces-cyber-de-la-coree-du-nord\/","url":"https:\/\/www.r2ie.org\/index.php\/2025\/05\/30\/les-menaces-cyber-de-la-coree-du-nord\/","name":"Les menaces cyber de la Cor\u00e9e du Nord - Revue Internationale d&#039;Intelligence Economique","isPartOf":{"@id":"https:\/\/www.r2ie.org\/#website"},"datePublished":"2025-05-30T12:08:51+00:00","breadcrumb":{"@id":"https:\/\/www.r2ie.org\/index.php\/2025\/05\/30\/les-menaces-cyber-de-la-coree-du-nord\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.r2ie.org\/index.php\/2025\/05\/30\/les-menaces-cyber-de-la-coree-du-nord\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.r2ie.org\/index.php\/2025\/05\/30\/les-menaces-cyber-de-la-coree-du-nord\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.r2ie.org\/"},{"@type":"ListItem","position":2,"name":"Les menaces cyber de la Cor\u00e9e du Nord"}]},{"@type":"WebSite","@id":"https:\/\/www.r2ie.org\/#website","url":"https:\/\/www.r2ie.org\/","name":"Revue Internationale d&#039;Intelligence Economique","description":"","publisher":{"@id":"https:\/\/www.r2ie.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.r2ie.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.r2ie.org\/#organization","name":"Revue Internationale d&#039;Intelligence Economique","url":"https:\/\/www.r2ie.org\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.r2ie.org\/#\/schema\/logo\/image\/","url":"https:\/\/www.r2ie.org\/wp-content\/uploads\/2023\/01\/cropped-cropped-logo-r2ie-dc3a9gradc3a9.webp","contentUrl":"https:\/\/www.r2ie.org\/wp-content\/uploads\/2023\/01\/cropped-cropped-logo-r2ie-dc3a9gradc3a9.webp","width":654,"height":251,"caption":"Revue Internationale d&#039;Intelligence Economique"},"image":{"@id":"https:\/\/www.r2ie.org\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.r2ie.org\/index.php\/wp-json\/wp\/v2\/posts\/3250","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.r2ie.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.r2ie.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/www.r2ie.org\/index.php\/wp-json\/wp\/v2\/comments?post=3250"}],"version-history":[{"count":0,"href":"https:\/\/www.r2ie.org\/index.php\/wp-json\/wp\/v2\/posts\/3250\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.r2ie.org\/index.php\/wp-json\/wp\/v2\/media?parent=3250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.r2ie.org\/index.php\/wp-json\/wp\/v2\/categories?post=3250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.r2ie.org\/index.php\/wp-json\/wp\/v2\/tags?post=3250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}