Annonce

Réduire
Aucune annonce.

Panne nationale : les cartes bancaires Visa et Mastercard bloquées pour de nombreux clients en France

Réduire
X
 
  • Filtre
  • Heure
  • Afficher
Tout nettoyer
nouveaux messages

  • Panne nationale : les cartes bancaires Visa et Mastercard bloquées pour de nombreux clients en France




    Une panne nationale affecte les systèmes de paiement Visa et Mastercard en France ce samedi soir, privant de nombreux clients de l'accès à leurs cartes bancaires.


    Une importante panne nationale touche les cartes bancaires Visa et Mastercard de la plupart des banques françaises, ce samedi soir. Les paiements et les retraits d'argent sont impossibles pour de très nombreux clients. Certains ont fait part de leur désarroi sur les réseaux sociaux.

    Selon Downdetector, les banques touchées sont le Crédit Mutuel, le CIC, le Crédit Agricole, la Caisse d'Epargne, la Banque Populaire, la Société Générale, la Banque Postale et BNP Paribas.

    Les causes de cette panne ne sont pas connues pour l'heure.





  • #2
    Aprés l'Espagne et les attaques cybernétiques qui ont touché ce pays après qu'il a voté pour une loi qui interdit la vente des armes à Israel, les so hyounis visent la France par des attaques cybernétiques pour qu'elle ne reconnaisse jamais la Palestine. Ils ont déjà révélé les codes secrets des sousmarins nucléaires Français.
    Dernière modification par Issabrahimi, 31 août 2025, 00h27.

    Commentaire


    • #3
      Le Laboratoire Canadien Citizenlab qui a décortiqué et exposé Pégasus décrit une attaque sio niste contre les journalistes par le malware Paragone:

      Graphite CaughtFirst Forensic Confirmation of Paragon’s iOS Mercenary Spyware Finds Journalists Targeted

      By Bill Marczak and John Scott-Railton
      June 12, 2025Introduction


      On April 29, 2025, a select group of iOS users were notified by Apple that they were targeted with advanced spyware. Among the group were two journalists that consented for the technical analysis of their cases. The key findings from our forensic analysis of their devices are summarized below:
      • Our analysis finds forensic evidence confirming with high confidence that both a prominent European journalist (who requests anonymity), and Italian journalist Ciro Pellegrino, were targeted with Paragon’s Graphite mercenary spyware.
      • We identify an indicator linking both cases to the same Paragon operator.
      • Apple confirms to us that the zero-click attack deployed in these cases was mitigated as of iOS 18.3.1 and has assigned the vulnerability CVE-2025-43200.

      Our analysis is ongoing.
      Case 1: Prominent European Journalist


      We analyzed Apple devices belonging to a prominent European journalist who has requested to remain anonymous. On April 29, 2025, this journalist received an Apple notification and sought technical assistance.

      Our forensic analysis concluded that one of the journalist’s devices was compromised with Paragon’s Graphite spyware in January and early February 2025 while running iOS 18.2.1. We attribute the compromise to Graphite with high confidence because logs on the device indicated that it made a series of requests to a server that, during the same time period, matched our published Fingerprint P1. We linked this fingerprint to Paragon’s Graphite spyware with high confidence.

      Graphite spyware server contacted by the journalist’s device:
      https://46.183.184[.]91/
      The server appears to have been rented from VPS provider EDIS Global. The server remained online and continued to match Fingerprint P1 until at least April 12, 2025.
      https://citizenlab.ca/wp-content/upl.../06/image2.pngFigure 1. Censys result for the IP address contacted by the journalist’s phone during the infection period.
      We identified an iMessage account present in the device logs around the same time as the phone was communicating with the Paragon server 46.183.184[.]91. We redact the account and refer to it as ATTACKER1. Based on our forensic analysis, we conclude that this account was used to deploy Paragon’s Graphite spyware using a sophisticated iMessage zero-click attack. We believe that this infection would not have been visible to the target. Apple confirms to us that the zero-click attack deployed here was mitigated as of iOS 18.3.1 and has assigned CVE-2025-43200 to this zero-day vulnerability.
      Case 2: Ciro Pellegrino


      Ciro Pellegrino is a journalist and head of the Naples newsroom at Fanpage.it, where he has reported on numerous high-profile cases. On April 29, 2025, Mr. Pellegrino received an Apple notification and sought our technical assistance.

      We analyzed artifacts from Mr. Pellegrino’s iPhone and determined with high confidence that it was targeted with Paragon’s Graphite spyware. Our analysis of the device’s logs revealed the presence of the same ATTACKER1 iMessage account used to target the journalist from Case 1, which we associate with a Graphite zero-click infection attempt.
      https://citizenlab.ca/wp-content/upl...gonredux-1.pngFigure 2. Attribution to Paragon’s Graphite spyware via artifacts found on the devices of Ciro Pellegrino and the unnamed prominent European journalist.
      It is standard for each customer of a mercenary spyware company to have its own dedicated infrastructure. Thus, we believe that the ATTACKER1 account would be used exclusively by a single Graphite customer / operator, and we conclude that this customer targeted both individuals.

      Our forensic analyses of these attacks, and Paragon’s iOS capabilities, are ongoing.
      The Fanpage.it Paragon Cluster


      Mr. Pellegrino’s close colleague and Fanpage.it editor, Francesco Cancellato, was notified in January 2025 by WhatsApp that he was targeted with Paragon’s Graphite spyware.

      The Citizen Lab has been conducting forensic analysis of Mr. Cancellato’s Android device. However, as of our initial report, we were unable to obtain forensic confirmation of a successful infection of Mr. Cancellato’s Android. As we explained at the time: “Given the sporadic nature of Android logs, the absence of a finding of BIGPRETZEL on a particular device does not mean that the phone wasn’t successfully hacked, simply that relevant logs may not have been captured or may have been overwritten.”

      Following Mr. Cancellato’s case, the identification of a second journalist at Fanpage.it targeted with Paragon suggests an effort to target this news organization This appears to be a distinct cluster of cases that warrants further scrutiny.
      Statements by Paragon and the Italian Government


      On June 5, 2025, the Italian government’s parliamentary committee overseeing Italy’s intelligence services (COPASIR: Comitato Parlamentare per la Sicurezza della Repubblica) published the report of their inquiry into the Paragon affair in Italy.

      The report acknowledged that the Italian government had used Paragon’s Graphite spyware against Luca Casarini and Dr. Giuseppe “Beppe” Caccia, the two individuals where we found forensic evidence of Graphite present (via the BIGPRETZEL Android indicator). However, the report stated that they were unable to determine who might have targeted Mr. Cancellato with Graphite.

      On June 9, 2025, Haaretz reported that Paragon had offered to assist the Italian government in investigating the case of Mr. Cancellato, an offer that they say was rejected by the Italian government. Paragon also suggested that they had unilaterally terminated Italy’s contracts.

      In response later that day, the Italian Department of Security Intelligence (DIS: Dipartimento delle Informazioni per la Sicurezza), which coordinates Italy’s intelligence services, stated that it had rejected Paragon’s offer because of national security concerns with exposing their activities to Paragon. They stated that providing Paragon such access would impact the reputation of Italy’s security services among peer services around the world. They denied that the contract termination was unilateral. Later the same day, the COPASIR committee stated that they had chosen not to proceed with Paragon’s offer, but instead elected to directly query the Paragon databases, having deemed the approaches to be equivalent.

      The committee also stated a willingness to declassify Paragon’s testimony to the committee.Response from Paragon Solutions


      On June 10, 2025, we sent a summary of our latest findings to Paragon Solutions and offered them the opportunity to reply, which we undertook to publish in full. As of the time of publication we have not received a response.
      Europe’s Continuing Spyware Crisis: Journalists at Risk


      At the time of publishing, three European journalists have been confirmed as targets of Paragon’s graphite mercenary spyware. Two of these confirmations are now forensically based, and the third follows from a notification by Meta. Yet to date, there has been no explanation as to who is responsible for spying on these journalists.

      Furthermore, the confirmation of a second case linked to a specific Italian news outlet (Fanpage.it) adds urgency to the question of which Paragon customer is responsible for this targeting, and pursuant to what legal authority (if any) this targeting took place.

      The lack of accountability available to these spyware targets highlights the extent to which journalists in Europe continue to be subjected to this highly invasive digital threat, and underlines the dangers of spyware proliferation and abuse.

      Our analysis of Paragon targeting on iOS and Android is ongoing. We thank Access Now for their support.
      Have You Received a Warning?


      If you are a journalist, human rights defender, or other member of civil society and received a spyware warning from Apple, Meta, WhatsApp, Google or others, take it seriously and seek expert assistance.

      Here is an example of one such notification:

      Commentaire


      • #4
        Les so hyounis grace aux Américains utilisent des moyens cynernétiques sophistiqués. Probablement des companies comme Bomgar, Damware leur produisent des outils informatiques sophistiqués pour accéder aux serveurs de plusieurs pays.

        le mossad a un accés à la NSA selon Snowdon.

        Palantir une companie AI Améiricaine utilisée à Gaza pour génocider les Palestiniens selon un score crée par ce systeme.
        Dernière modification par Issabrahimi, 31 août 2025, 00h38.

        Commentaire


        • #5
          les banques touchées sont le Crédit Mutuel, le CIC, le Crédit Agricole, la Caisse d'Epargne, la Banque Populaire, la Société Générale, la Banque Postale et BNP Paribas.
          J'ai payé, sans problème, le restaurant ce midi avec la carte de la Banque Postale.

          Commentaire


          • #6
            Issabrahimi

            les so hyounis visent la France par des attaques cybernétiques
            Il est de notoriété publique que les hackers russes visent particulièrement la France.
            Car Moscou a identifié ce pays comme étant « son principal adversaire en Europe ».

            Commentaire


            • #7
              Même sans panne informatique, on peut se retrouver avec une carte défectueuse ou tout simplement la perdre.

              La prudence élémentaire veut d'avoir au moins 2 cartes de paiement, si possible une chez Visa et une chez Mastercard.

              En ce qui me concerne, j'en ai 3 :
              - celle de ma banque principale qui est une banque classique
              - celle de ma banque en ligne Fortuneo qui est gratuite
              - la carte de paiement de mon hypermarché dont la cotisation annuelle est inférieure à 20 euros, largement remboursés par les réductions qu'elle m'apporte. En pratique : c'est aussi une carte Mastercard que je peux utiliser partout.
              Dernière modification par scipio, 31 août 2025, 20h18.
              au n°16 de la rue Grande-Pohulanka, à Wilno, habitait M. Piekielny

              Commentaire


              • #8
                Il est de notoriété publique que les hackers russes visent particulièrement la France.
                Car Moscou a identifié ce pays comme étant « son principal adversaire en Europe ».


                Les Russes n'ont pas les moyens cybernétiques des So hyounis souvent aidés par des sociétés Américaines qui produisent la creme de la creme comme Bomgar, Dameware.

                Et ne pense pas que les Sohuounis ne viseront pas la France. l'Ambassadeur Américain juifen France a refusé de rencontrer votre ministre de l'Extérieur. Ils vous méprisent complètement.

                Votre propre président était menacé de la mort en direct par un Rabbin juif.
                Dernière modification par Issabrahimi, 31 août 2025, 20h40.

                Commentaire


                • #9
                  Issabrahimi

                  Ce n'est pas une attaque informatique.

                  Le Crédit mutuel Alliance Fédérale s’explique sur la panne informatique subie samedi par ses clients, « inédite par son ampleur »

                  « Une panne inédite. » Le Crédit mutuel Alliance Fédérale est revenu ce lundi sur l’incident qui a touché samedi ses clients. D’une incidence « inédite pour le groupe, tant par sa durée que son ampleur », il a notamment empêché les transactions par carte bancaire de ses clients pendant deux heures.

                  En cause : un problème informatique dans le système de vérification des transactions, qui lors du passage de la carte bancaire, s’assure qu’elle n’est pas frauduleuse et que les fonds sont bien disponibles. Ces serveurs d’autorisation « n’étaient plus en mesure », à partir de 17h20, « de répondre aux demandes émises par les » terminaux de paiements « des commerçants ou les distributeurs automatiques de billets », explique dans un communiqué le 3e groupe bancaire de France en nombre de clients.


                  Bientôt même les aléas climatiques seront attribuées aux siounistes.

                  Commentaire


                  • #10
                    alibigoud

                    J'ai parlé d'une possibilité. Comme l'espagne pense aussi que le blackout était due à une panne.

                    Et je l'ai dit car je sais que tu vas venir en défense ici.

                    Commentaire

                    Chargement...
                    X