{"id":218247,"date":"2018-12-06T15:43:24","date_gmt":"2018-12-06T14:43:24","guid":{"rendered":"https:\/\/www.intrinsec.com\/?p=218247"},"modified":"2018-12-06T15:43:24","modified_gmt":"2018-12-06T14:43:24","slug":"menaces-cyber-moyen-orient-afrique-nord","status":"publish","type":"post","link":"https:\/\/www.intrinsec.com\/en\/menaces-cyber-moyen-orient-afrique-nord\/","title":{"rendered":"Cyber threats: a rise in the Middle East and North Africa region"},"content":{"rendered":"<p>[et_pb_section fb_built= \u00bb1\u2033 admin_label= \u00bbsection \u00bb _builder_version= \u00bb3.0.47\u2033][et_pb_row admin_label= \u00bbrow \u00bb _builder_version= \u00bb3.0.48\u2033 background_size= \u00bbinitial \u00bb background_position= \u00bbtop_left \u00bb background_repeat= \u00bbrepeat \u00bb][et_pb_column type= \u00bb4_4\u2033 _builder_version= \u00bb3.0.47\u2033 parallax= \u00bboff \u00bb parallax_method= \u00bbon \u00bb][et_pb_text admin_label= \u00bbText \u00bb _builder_version= \u00bb3.0.74\u2033 background_size= \u00bbinitial \u00bb background_position= \u00bbtop_left \u00bb background_repeat= \u00bbrepeat \u00bb]<\/p>\n<p><em>This article deals with the still little-known subject of... <strong>cyber threats<\/strong> within the<strong>\u2019&#039;Arabic-speaking ecosystem&#039;<\/strong> They can take various forms (hacker groups, malware sales, tailored phishing campaigns, bank fraud, or counterfeiting) and originate from local actors motivated by diverse factors. This study aims to demonstrate that these threats can have a <strong>impact on companies located in the Middle East and North Africa (MENA) region<\/strong>. <\/em><\/p>\n<p>With a total population of over 420 million and an economy exceeding \u20ac2.4 trillion, the Middle East and North Africa (MENA) region encompasses 22 <a href=\"\/en\/#_ftn1\" name=\"_ftnref1\">[1]<\/a> These countries share the same language, as well as ethnic, religious, and cultural similarities. However, they exhibit significant heterogeneity from a demographic, political, linguistic, and economic perspective, as well as considerable disparities both within the region itself and with other countries.<\/p>\n<p>In general, companies operating in the Middle East and North Africa region are pleased with their operations; this region is driven by significant <strong>growth dynamics<\/strong>.The region&#039;s great growth potential is characterized by its<strong> economic diversification<\/strong> ongoing. Its development is driven by a strategy of modernizing traditional sectors and developing promising sectors for the future. This diversity is a major asset and a real draw for foreign companies.<\/p>\n<p>By comparing the<strong> Internet infrastructure<\/strong> implementations as well as the importance of telecommunications companies <a href=\"\/en\/#_ftn2\" name=\"_ftnref2\">[2]<\/a>, Significant disparities are observed within the\u2019<strong>cyber space<\/strong> of the MENA region. In this respect, North Africa appears to have a much better network than the Middle East.<\/p>\n<p>With the<strong> digitization<\/strong> With the increasing number of companies operating in the Middle East and North Africa region, they face a variety of cyber threats such as APT (advanced persistent threats) attacks,<strong> cyber-activism<\/strong>, THE<strong> cyber espionage<\/strong>, there <strong>digital fraud<\/strong>. Furthermore, we also observed some attacks of the type <strong>phishing<\/strong> or attacks using <strong>ransomware<\/strong>, of the <strong>spyware<\/strong>, etc. They seemed to be favored by attackers operating in this region.<\/p>\n<p>After more than two years devoted to observing and analyzing the\u2019<strong>Arabic-speaking ecosystem<\/strong> on the <strong>malicious web networks<\/strong>, our cell of <a href=\"https:\/\/www.intrinsec.com\/en\/cyber-threat-intelligence\/\"><strong>Cyber Threat Intelligence<\/strong><\/a> decided to share its observations and report on the diversity of techniques, operating methods, motivations, and functions within this microcosm. In light of these elements, we will detail the risks faced by companies operating in the region (MENA).<\/p>\n<p>OUR <strong>monitoring unit<\/strong>, and, as part of its daily support to clients, has detected threats from offensive actors originating in the Middle East involving all types of threats targeting <strong>European organizations<\/strong>, the main economic location of our unit:<strong> data breach<\/strong> collaborators, <strong>DDoS attack preparation<\/strong> (Denial of service attack), <strong>phishing<\/strong>,<strong> trademark infringement<\/strong>, <strong>damage to image<\/strong> And<strong> denigration<\/strong>,<strong> frauds<\/strong>, etc.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>The APTs<\/strong><\/h2>\n<p>&nbsp;<\/p>\n<p>The MENA region has historically been a sensitive area in all areas, including cybersecurity. Companies operating in the region, as well as local governments, are prime targets for many types of actors, including perpetrators of...\u2019<strong>APT (Advanced Persistent Threat)<\/strong>.<\/p>\n<p>Political and military conflicts in the Middle East resonate in the region&#039;s cyberspace. For example, in 2010, Iran&#039;s nuclear program was the target of an unprecedented attack, aimed at its uranium enrichment centrifuges. This event is associated with the discovery of the first <strong>malware<\/strong> allowing the spying on and modification of industrial systems, including <strong>SCADA systems<\/strong>, used for industrial process control. Named <strong>Stuxnet<\/strong>, This malware has been described by experts as a &quot;\u00ab\u00a0<strong>cyber weapon\u00a0<\/strong>\u00bb&quot;possessing an unusual level of complexity.&quot;.<\/p>\n<p>The Saudi-Iranian conflict in the Middle East is believed to be a catalyst for cyberattacks in the region. Indeed, Saudi Arabia is a frequent target of cyberattacks, as evidenced by malware. <strong>Shamoon<\/strong>, which notably targeted the energy sector in 2012, and the public and financial sectors in 2016. Furthermore, the latest analysis from the cybersecurity firm FireEye, dated September 2017, specifies that the hacking group behind Shamoon has alleged links to the Iranian government. Dubbed APT33, and active since 2013, the group is believed to be behind cyberattacks targeting the energy sector in Saudi Arabia. In July 2017, Qatar also accused the United Arab Emirates of being behind the <strong>hacking of its official news agency (QNA)<\/strong> in May 2017, which caused a <strong>deep diplomatic and commercial crisis<\/strong> in the Gulf region for over a year.<\/p>\n<p>Finally, another group, known as &quot;\u00ab <strong>Desert Falcons<\/strong> \u00bb&quot;, and active since 2011, reportedly targets numerous large companies and individuals in the Middle East. Experts consider this group to be the leading group developing and conducting operations of<strong> large-scale cyber espionage<\/strong>. Their activities have reportedly already claimed 3,000 victims in some fifty countries. The list of targeted institutions includes defense agencies and government bodies, particularly those responsible for combating money laundering, figures in the business and media sectors, research and educational institutions, energy networks, activists and political leaders, physical security companies, as well as other targets in possession of strategic information. The method used by Desert Falcon is said to be...<strong> spear phishing<\/strong> via emails and social media.<\/p>\n<p>On a smaller scale, the <strong>cyber-malicious offers<\/strong> are diversifying through platforms where any individual can obtain the tools and advice useful for the attack they wish to carry out.<\/p>\n<p>These malicious offers are intensifying daily, taking many forms, ranging from simple <strong>hacking service<\/strong>, passing through the <strong>spam distribution offers,<\/strong> there <strong>malware sales<\/strong> and feat, the<strong> selling and sharing bank cards<\/strong>, identity documents, and other documents, as well as the <strong>sale of counterfeit products<\/strong>. We will try to illustrate concrete examples of all these services.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h2><strong>Ideology: A catalyst for malicious actors <\/strong><\/h2>\n<p>&nbsp;<\/p>\n<p><strong>ALALAMIYA<\/strong>, <strong>Dev-Point<\/strong> or<strong> SOQOR<\/strong>, are the names of <strong>forums<\/strong> The most popular forums dedicated to hacking in the MENA region. Hacking activity characterized by a sense of camaraderie and cordiality in exchanges. These forums also contain ideological sections. <em>[Figures 1 and 2].<\/em><\/p>\n<p style=\"text-align: center;\"><strong><img fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-218248 aligncenter\" src=\"\/wp-content\/uploads\/2018\/12\/Figure1-300x155.png\" alt=\"\" width=\"771\" height=\"398\" \/><\/strong><strong><em>Figure 1: A message from a hacker explaining his motivations on the AlAlamiya forum<\/em><\/strong><\/p>\n<p><img decoding=\"async\" class=\"wp-image-218249 aligncenter\" src=\"\/wp-content\/uploads\/2018\/12\/Figure2-300x98.png\" alt=\"\" width=\"815\" height=\"266\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em>Figure 2: A message calling on members of the Soqor forum to enrich the forum&#039;s religion section<\/em><\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Selling malware: A business in its own right<\/strong><\/h2>\n<p>&nbsp;<\/p>\n<p><strong>Funding vectors<\/strong><\/p>\n<p>There<strong> selling malware<\/strong> is a very widespread activity within Arabic-speaking communities. Naturally, one can find presentations of all types of malware on Arabic-language forums, with download links, tutorials, and discussion forums for resolving potential technical problems. For example, the<strong> WannaCry ransomware<\/strong>, used during a <strong>global cyberattack<\/strong> massive in May 2017, and which affected more than 300,000 computers in over 150 countries, has been for sale on an Arabic-language forum since May 2017 <em>[Figure 3].<\/em><\/p>\n<p><img decoding=\"async\" class=\"wp-image-218250 aligncenter\" src=\"\/wp-content\/uploads\/2018\/12\/Figure3-300x198.png\" alt=\"\" width=\"753\" height=\"497\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em>Figure 3: The WannaCry ransomware is for sale on the AlAlamiya forum<\/em><\/strong><\/p>\n<p>Within this same forum, members also offer<strong> farms for sale<\/strong> (programs that allow an individual or malware to exploit a computer security vulnerability). In our example, the seller also provides a video explaining how the kit works and demonstrating its validity. <em>[Figure 4].<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-218251 aligncenter\" src=\"\/wp-content\/uploads\/2018\/12\/Figure4-300x180.png\" alt=\"\" width=\"897\" height=\"538\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em>Figure 4: &quot;Exploit&quot; for sale on the Hack-int forum for 115$ on the AlAlamiya forum<\/em><\/strong><\/p>\n<p>Another member proposes a <strong>malware<\/strong> allowing\u2019<strong>inject the hacker&#039;s bitcoin address in place of the legitimate payment address for the transaction<\/strong>. The author of this advertisement explains that his tool would detect bitcoin addresses in the clipboard at the time of the &quot;copy&quot; action, and replaces the &quot;pasted&quot; bitcoin address with that of the hacker. <em>[Figure 5].<\/em><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-218252 aligncenter\" src=\"\/wp-content\/uploads\/2018\/12\/Figure5-300x156.png\" alt=\"\" width=\"896\" height=\"466\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em>Figure 5: Malware to steal the Bitcoin cryptocurrency, for sale for 30$ on the AlAlamiya forum<\/em><\/strong><\/p>\n<p>We have also observed a new trend, becoming widespread in the Arabic-speaking community: the <strong>development of malicious tools<\/strong> by local actors, and their promotion within certain Arabic-speaking communities. This is the case of a <strong>Spyware<\/strong> (spyware), called <strong>Spynote<\/strong> and designed by the administrators of<strong> Iraqi forum IQ-Team<\/strong>, <em>[Figure 6]<\/em> Recently shut down, this local spyware became very popular thanks to its technical capabilities and the documentation publicly shared by its authors. Spynote, which doesn&#039;t require physical access to the victim&#039;s device and targets Android devices, is reportedly capable of viewing all messages on various social media applications (WhatsApp, Messenger, Viber, etc.), reading SMS messages, listening to conversations, accessing data, and installing applications. Its accessibility and ease of use (even for a non-technical user) explain its widespread distribution within Arabic-speaking cyber communities. The fifth version of this spyware was available on the Iraqi forum until its closure and remains available for free download on several Arabic and English-language forums. This malware is already well-known and has been the subject of several analyses.<a href=\"https:\/\/researchcenter.paloaltonetworks.com\/2016\/07\/unit42-spynote-android-trojan-builder-leaked\/\"> https:\/\/researchcenter.paloaltonetworks.com\/2016\/07\/unit42-spynote-android-trojan-builder-leaked\/<\/a><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-218253 aligncenter\" src=\"\/wp-content\/uploads\/2018\/12\/Figure6-300x216.png\" alt=\"\" width=\"841\" height=\"605\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em>Figure 6: The Iraqi forum iq-team before its closure <\/em><\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-218254 aligncenter\" src=\"\/wp-content\/uploads\/2018\/12\/Figure7-300x146.png\" alt=\"\" width=\"909\" height=\"443\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em>Figure 7: The official YouTube channel of the Iraqi forum iq-team: a video explaining how the spyware works<\/em><\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-218255 aligncenter\" src=\"\/wp-content\/uploads\/2018\/12\/Figure8-300x168.png\" alt=\"\" width=\"915\" height=\"512\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em>Figure 8: Iraqi spyware being downloaded from an English-language website<\/em><\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>On the digital marketplace, a choice between &quot;Phishing as a Service&quot; or &quot;Tailor-made Phishing&quot;\u00ab<\/strong><\/h2>\n<p>&nbsp;<\/p>\n<p>THE<strong> phishing<\/strong> is another specialty of actors in the region. In the majority of e-commerce sections of malicious Arabic-language forums, sellers offer pages of <strong>custom phishing<\/strong> or targeting world-renowned sites, for a fee of approximately $30 <em>[Figure 9].<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-218256 aligncenter\" src=\"\/wp-content\/uploads\/2018\/12\/Figure9-300x239.png\" alt=\"\" width=\"814\" height=\"649\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em>Figure 9: Phishing service on the AlAlamiya forum<\/em><\/strong><\/p>\n<p>Other actors have chosen to set up websites dedicated exclusively to phishing. These actors offer, through their sites, hundreds of phishing pages targeting major companies such as Facebook, PayPal, and Netflix, as well as French telecommunications companies. These pages are generated by malicious actors and made freely available to the public on their websites. <em>[Figure 10].<\/em> Once registered on their site, any internet user can share the malicious page to reach more victims. The login credentials and information gathered through this channel are then sent via a command and control (C&amp;C) server to the malicious actors.<em> [Figure 11]. <\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-218257 aligncenter\" src=\"\/wp-content\/uploads\/2018\/12\/Figure10-300x225.png\" alt=\"\" width=\"860\" height=\"645\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em>Figure 10: Phishing page generation service on Anomor<\/em><\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-218258 aligncenter\" src=\"\/wp-content\/uploads\/2018\/12\/Figure11-300x140.png\" alt=\"\" width=\"965\" height=\"450\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em>Figure 11: The (pirate) client area of the Anomor phishing page generation service<\/em><\/strong><\/p>\n<p>The Arabic-speaking ecosystem is also marked by cyber threats related to the<strong> fraud<\/strong>, like the <strong>provision of false documents<\/strong>, as well as the<strong> resale of personal data<\/strong> or bank cards. But Arabic-speaking players are not interested in bank cards or local forgeries. Indeed, the usual fraud schemes do not allow the use of stolen data in the MENA region because, in some Arab countries, electronic payment methods are not sufficiently developed for widespread use. This situation is reflected in the number of Arabic-language e-commerce sites, which remains disproportionate to the population.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Bank fraud: why hide it?<\/strong><\/h2>\n<p>&nbsp;<\/p>\n<p>To meet this high demand, sections of malicious forums have been created to organize this trade. Some forums and communities are more audacious and are willing to sacrifice their anonymity to gain visibility on social media.<\/p>\n<p>In this situation, the <strong>trade in bank cards and forged foreign documents<\/strong> has developed rapidly. The most common activity is...\u2019<strong>purchase of computer equipment<\/strong> via stolen bank cards or the resale of these bank cards.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-218259 aligncenter\" src=\"\/wp-content\/uploads\/2018\/12\/Figure12-300x161.png\" alt=\"\" width=\"916\" height=\"492\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em>Figure 12: Sale of 47 French bank cards on the AlAlamiya forum<\/em><\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-218260 aligncenter\" src=\"\/wp-content\/uploads\/2018\/12\/Figure13-300x228.png\" alt=\"\" width=\"805\" height=\"611\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em>Figure 13: Sharing of 6 French bank cards on the AlAlamiya forum<\/em><\/strong><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-218261\" src=\"\/wp-content\/uploads\/2018\/12\/Figure14-300x133.png\" alt=\"\" width=\"1010\" height=\"448\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em>Figure 14: Sale of four French identity cards <\/em><\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-218262 aligncenter\" src=\"\/wp-content\/uploads\/2018\/12\/Figure15-300x118.png\" alt=\"\" width=\"1028\" height=\"404\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em>Figure 15: Sale of login credentials belonging to a customer of a French bank, on a Maghreb Facebook group<\/em><\/strong><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-218263\" src=\"\/wp-content\/uploads\/2018\/12\/Figure16-300x142.png\" alt=\"\" width=\"964\" height=\"456\" \/><\/p>\n<p style=\"text-align: center;\"><strong><em>Figure 16: Sharing bank card data on an Arabic Telegram channel<\/em><\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Counterfeiting is rampant.<\/strong><\/h2>\n<p>&nbsp;<\/p>\n<p>There<strong> counterfeit<\/strong> It is also found on platforms dedicated to Arabic-language classified ads, but it is difficult to obtain a precise and reliable assessment of its extent. By searching for the name of a well-known brand (in the luxury sector, for example) on one of these sites, one can observe a significant number of ads offering counterfeit products; the same result can be obtained simply by searching for the keywords &quot;counterfeit&quot; or &quot;forgery&quot; in Arabic. It should be noted that counterfeiting in Arabic-speaking communities <strong>affects all sectors<\/strong>.Counterfeiters primarily operate on an opportunistic and profit-driven strategy, targeting the most popular brands. We have also detected <strong>several groups on social media<\/strong> (Facebook, WhatsApp, Telegram, etc.), dedicated to the sale of counterfeit products.<\/p>\n<p>&nbsp;<\/p>\n<h2><em>Conclusion<\/em><\/h2>\n<p>Modern Standard Arabic is the official language in the MENA region, used particularly in administration, education, and the media. It is the most widely used and understood language in the region, even if it is not the native language of every Arabic speaker. However, each geographical area has a dialect, which can be considered the spoken language of the country: the North African or Maghrebi dialect, the Egyptian and Levantine dialects, and the Gulf dialect. Communication between people in Arab countries can also be in French (in countries where French is a second language, e.g., <strong>Morocco<\/strong>, <strong>Algeria<\/strong>, <strong>Tunisia<\/strong>), in English in the case of the\u2019<strong>Egypt<\/strong> and the <strong>Gulf countries<\/strong>, or even in French and English as in<strong> Lebanon<\/strong>.<\/p>\n<p>Each geographical area of the region (MENA) has its own dialect, as well as its own history and specific characteristics; it is therefore necessary to master them perfectly and independently of each other in order to have a comprehensive analysis and vision of the ecosystem and<a href=\"https:\/\/www.intrinsec.com\/en\/cyber-threat-intelligence\/\"><strong> adapt the monitoring strategy<\/strong><\/a> depending on the stakes.<\/p>\n<p>THE <strong>cyber threats<\/strong> Contrary to the limited number of companies established in the region in the civilian sector, we have observed a strong attachment to religion and ideology. The spaces for interaction between stakeholders reflect the nature of the society, where feelings of brotherhood, religious affiliation, and the common enemy take precedence over discussions. Companies based in the region must understand the <strong>characteristic of Arab societies<\/strong>\u00a0Poor communication, for example, can have harmful repercussions.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>[1]<\/strong> <em>Morocco, Algeria, Tunisia, Libya, Mauritania, Egypt, Lebanon, Syria, Israel, Jordan, Palestine, Iraq, Saudi Arabia, Qatar, Yemen, United Arab Emirates, Kuwait, Oman, Sudan, Somalia, Djibouti, Iran<a href=\"\/en\/#_ftnref1\" name=\"_ftn1\"><\/a><\/em><\/p>\n<p><strong>[2]<\/strong><em><a href=\"http:\/\/www.worldbank.org\/content\/dam\/Worldbank\/document\/MNA\/Broadband_report\/MNA_Broadband_Executive%20Summary_Arabic.pdf\">\u00a0http:\/\/www.worldbank.org\/content\/dam\/Worldbank\/document\/MNA\/Broadband_report\/MNA_Broadband_Executive%20Summary_Arabic.pdf<\/a> <\/em><\/p>\n<p><a href=\"\/en\/#_ftnref2\" name=\"_ftn2\"><\/a><em>\u00a0<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>","protected":false},"excerpt":{"rendered":"<p>[et_pb_section fb_built= \u00bb1\u2033 admin_label= \u00bbsection \u00bb _builder_version= \u00bb3.0.47\u2033][et_pb_row admin_label= \u00bbrow \u00bb _builder_version= \u00bb3.0.48\u2033 background_size= \u00bbinitial \u00bb background_position= \u00bbtop_left \u00bb background_repeat= \u00bbrepeat \u00bb][et_pb_column type= \u00bb4_4\u2033 _builder_version= \u00bb3.0.47\u2033 parallax= \u00bboff \u00bb parallax_method= \u00bbon \u00bb][et_pb_text admin_label= \u00bbText \u00bb _builder_version= \u00bb3.0.74\u2033 [\u2026]<\/p>","protected":false},"author":13,"featured_media":218269,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[],"class_list":["post-218247","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-threat-intelligence"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Intrinsec - Les menaces cyber : une mont\u00e9e en puissance dans la zone Moyen-Orient et Afrique du Nord<\/title>\n<meta name=\"description\" content=\"Cet article traite du sujet encore m\u00e9connu que sont les menaces cyber au sein de l\u2019\u00e9co syst\u00e8me arabophone Elles peuvent se d\u00e9cliner sous diff\u00e9rentes formes (groupe de pirates, vente de malware, de campagnes de phishing sur mesure, de fraude bancaire ou de contrefa\u00e7ons) et proviennent d\u2019acteurs locaux motiv\u00e9s par des facteurs divers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intrinsec.com\/en\/menaces-cyber-moyen-orient-afrique-nord\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les menaces cyber : une mont\u00e9e en puissance dans la zone Moyen-Orient et Afrique du Nord\" \/>\n<meta property=\"og:description\" content=\"Cet article traite du sujet encore m\u00e9connu que sont les menaces cyber au sein de l\u2019\u00e9co syst\u00e8me arabophone Elles peuvent se d\u00e9cliner sous diff\u00e9rentes formes (groupe de pirates, vente de malware, de campagnes de phishing sur mesure, de fraude bancaire ou de contrefa\u00e7ons) et proviennent d\u2019acteurs locaux motiv\u00e9s par des facteurs divers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intrinsec.com\/en\/menaces-cyber-moyen-orient-afrique-nord\/\" \/>\n<meta property=\"og:site_name\" content=\"INTRINSEC\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-06T14:43:24+00:00\" \/>\n<meta name=\"author\" content=\"Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/menaces-cyber-moyen-orient-afrique-nord\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/menaces-cyber-moyen-orient-afrique-nord\\\/\"},\"author\":{\"name\":\"Admin\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/5636e3e5276b952facbd0aadb12a858a\"},\"headline\":\"Les menaces cyber : une mont\u00e9e en puissance dans la zone Moyen-Orient et Afrique du Nord\",\"datePublished\":\"2018-12-06T14:43:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/menaces-cyber-moyen-orient-afrique-nord\\\/\"},\"wordCount\":2865,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/menaces-cyber-moyen-orient-afrique-nord\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"Cyber Threat Intelligence\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.intrinsec.com\\\/menaces-cyber-moyen-orient-afrique-nord\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/menaces-cyber-moyen-orient-afrique-nord\\\/\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/menaces-cyber-moyen-orient-afrique-nord\\\/\",\"name\":\"Intrinsec - Les menaces cyber : une mont\u00e9e en puissance dans la zone Moyen-Orient et Afrique du Nord\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/menaces-cyber-moyen-orient-afrique-nord\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/menaces-cyber-moyen-orient-afrique-nord\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2018-12-06T14:43:24+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/5636e3e5276b952facbd0aadb12a858a\"},\"description\":\"Cet article traite du sujet encore m\u00e9connu que sont les menaces cyber au sein de l\u2019\u00e9co syst\u00e8me arabophone Elles peuvent se d\u00e9cliner sous diff\u00e9rentes formes (groupe de pirates, vente de malware, de campagnes de phishing sur mesure, de fraude bancaire ou de contrefa\u00e7ons) et proviennent d\u2019acteurs locaux motiv\u00e9s par des facteurs divers.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/menaces-cyber-moyen-orient-afrique-nord\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.intrinsec.com\\\/menaces-cyber-moyen-orient-afrique-nord\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/menaces-cyber-moyen-orient-afrique-nord\\\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/menaces-cyber-moyen-orient-afrique-nord\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.intrinsec.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Les menaces cyber : une mont\u00e9e en puissance dans la zone Moyen-Orient et Afrique du Nord\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#website\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/\",\"name\":\"INTRINSEC\",\"description\":\"Notre m\u00e9tier , Prot\u00e9ger le v\u00f4tre\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.intrinsec.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/5636e3e5276b952facbd0aadb12a858a\",\"name\":\"Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=retro&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=retro&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=retro&r=g\",\"caption\":\"Admin\"},\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/en\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Intrinsec - Cyber threats: a rise in the Middle East and North Africa region","description":"This article deals with the still little-known subject of cyber threats within the Arabophone ecosystem. They can take different forms (hacker groups, sale of malware, tailor-made phishing campaigns, bank fraud or counterfeiting) and come from local actors motivated by various factors.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intrinsec.com\/en\/menaces-cyber-moyen-orient-afrique-nord\/","og_locale":"en_US","og_type":"article","og_title":"Les menaces cyber : une mont\u00e9e en puissance dans la zone Moyen-Orient et Afrique du Nord","og_description":"Cet article traite du sujet encore m\u00e9connu que sont les menaces cyber au sein de l\u2019\u00e9co syst\u00e8me arabophone Elles peuvent se d\u00e9cliner sous diff\u00e9rentes formes (groupe de pirates, vente de malware, de campagnes de phishing sur mesure, de fraude bancaire ou de contrefa\u00e7ons) et proviennent d\u2019acteurs locaux motiv\u00e9s par des facteurs divers.","og_url":"https:\/\/www.intrinsec.com\/en\/menaces-cyber-moyen-orient-afrique-nord\/","og_site_name":"INTRINSEC","article_published_time":"2018-12-06T14:43:24+00:00","author":"Admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Admin","Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.intrinsec.com\/menaces-cyber-moyen-orient-afrique-nord\/#article","isPartOf":{"@id":"https:\/\/www.intrinsec.com\/menaces-cyber-moyen-orient-afrique-nord\/"},"author":{"name":"Admin","@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/5636e3e5276b952facbd0aadb12a858a"},"headline":"Les menaces cyber : une mont\u00e9e en puissance dans la zone Moyen-Orient et Afrique du Nord","datePublished":"2018-12-06T14:43:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intrinsec.com\/menaces-cyber-moyen-orient-afrique-nord\/"},"wordCount":2865,"commentCount":0,"image":{"@id":"https:\/\/www.intrinsec.com\/menaces-cyber-moyen-orient-afrique-nord\/#primaryimage"},"thumbnailUrl":"","articleSection":["Cyber Threat Intelligence"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intrinsec.com\/menaces-cyber-moyen-orient-afrique-nord\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.intrinsec.com\/menaces-cyber-moyen-orient-afrique-nord\/","url":"https:\/\/www.intrinsec.com\/menaces-cyber-moyen-orient-afrique-nord\/","name":"Intrinsec - Cyber threats: a rise in the Middle East and North Africa region","isPartOf":{"@id":"https:\/\/www.intrinsec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intrinsec.com\/menaces-cyber-moyen-orient-afrique-nord\/#primaryimage"},"image":{"@id":"https:\/\/www.intrinsec.com\/menaces-cyber-moyen-orient-afrique-nord\/#primaryimage"},"thumbnailUrl":"","datePublished":"2018-12-06T14:43:24+00:00","author":{"@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/5636e3e5276b952facbd0aadb12a858a"},"description":"This article deals with the still little-known subject of cyber threats within the Arabophone ecosystem. They can take different forms (hacker groups, sale of malware, tailor-made phishing campaigns, bank fraud or counterfeiting) and come from local actors motivated by various factors.","breadcrumb":{"@id":"https:\/\/www.intrinsec.com\/menaces-cyber-moyen-orient-afrique-nord\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intrinsec.com\/menaces-cyber-moyen-orient-afrique-nord\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.intrinsec.com\/menaces-cyber-moyen-orient-afrique-nord\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/www.intrinsec.com\/menaces-cyber-moyen-orient-afrique-nord\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.intrinsec.com\/"},{"@type":"ListItem","position":2,"name":"Les menaces cyber : une mont\u00e9e en puissance dans la zone Moyen-Orient et Afrique du Nord"}]},{"@type":"WebSite","@id":"https:\/\/www.intrinsec.com\/#website","url":"https:\/\/www.intrinsec.com\/","name":"INTRINSEC","description":"Our job is to protect yours.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intrinsec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/5636e3e5276b952facbd0aadb12a858a","name":"Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=retro&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=retro&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=retro&r=g","caption":"Admin"},"url":"https:\/\/www.intrinsec.com\/en\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/218247","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/comments?post=218247"}],"version-history":[{"count":0,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/218247\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/media?parent=218247"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/categories?post=218247"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/tags?post=218247"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}