

{"version":"1.0","provider_name":"Gestions hospitali\u00e8res","provider_url":"https:\/\/www.ricom-web8.com\/gestions","author_name":"Gestions hospitali\u00e8res","author_url":"https:\/\/www.ricom-web8.com\/gestions\/author\/benjamin\/","title":"Cyberattaque au CHU de Rouen - Gestions hospitali\u00e8res","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"E82NIPA0eE\"><a href=\"https:\/\/www.ricom-web8.com\/gestions\/cyberattaque-au-chu-de-rouen\/\">Cyberattaque au CHU de Rouen<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.ricom-web8.com\/gestions\/cyberattaque-au-chu-de-rouen\/embed\/#?secret=E82NIPA0eE\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Cyberattaque au CHU de Rouen\u00a0\u00bb &#8212; Gestions hospitali\u00e8res\" data-secret=\"E82NIPA0eE\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"Propos recueillis par Chafika MAZOUNI MENARD et Christophe GOT Pouvez-vous revenir sur l\u2019attaque informatique qui a cibl\u00e9 votre \u00e9tablissement en novembre 2019\u2009? L\u2019incident d\u00e9bute le 15 novembre 2019 vers 19\u2009h\u200900, veille de week-end, avec le signalement par un interne du service des urgences d\u2019un probl\u00e8me de droits d\u2019acc\u00e8s \u00e0 une application m\u00e9tier. Apr\u00e8s analyses depuis les outils de supervision puis par une prise en main sur des syst\u00e8mes impact\u00e9s, l\u2019astreinte&hellip;"}