{"id":242672,"date":"2026-02-11T10:41:11","date_gmt":"2026-02-11T10:41:11","guid":{"rendered":"https:\/\/www.jolera.com\/quand-les-plateformes-de-confiance-vehiculent-des-logiciels-malveillants\/"},"modified":"2026-04-14T14:22:27","modified_gmt":"2026-04-14T14:22:27","slug":"quand-les-plateformes-de-confiance-vehiculent-des-logiciels-malveillants","status":"publish","type":"post","link":"https:\/\/www.jolera.com\/fr\/quand-les-plateformes-de-confiance-vehiculent-des-logiciels-malveillants\/","title":{"rendered":"Quand les plateformes de confiance v\u00e9hiculent des logiciels malveillants"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.27.5&#8243; background_enable_color=&#8221;off&#8221; background_image=&#8221;https:\/\/www.jolera.com\/wp-content\/uploads\/When-Trusted-Platforms-Carry-Malware-The-Emerging-Risk-on-Hugging-Face.jpg&#8221; custom_padding=&#8221;120px||||false|false&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Quand les plateformes de confiance v\u00e9hiculent des logiciels malveillants<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Le risque \u00e9mergent sur le Hugging Face<\/p>\n<p>[\/et_pb_text][et_pb_button button_text=&#8221;5 minutes de lecture&#8221; button_alignment=&#8221;left&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;14px&#8221; button_text_color=&#8221;#0F2E5C&#8221; button_bg_color=&#8221;#d7f0ff&#8221; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;6px&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Depuis des ann\u00e9es, <strong>Hugging Face<\/strong> a \u00e9t\u00e9 adopt\u00e9 par la communaut\u00e9 de l&#8217;intelligence artificielle en tant que plaque tournante pour les mod\u00e8les, les ensembles de donn\u00e9es et le d\u00e9veloppement collaboratif. Souvent compar\u00e9e au &#8220;<strong>GitHub de l&#8217;IA<\/strong>&#8220;, la plateforme h\u00e9berge des centaines de milliers de mod\u00e8les d&#8217;apprentissage automatique utilis\u00e9s par des chercheurs, des d\u00e9veloppeurs et des entreprises du monde entier. Sa r\u00e9putation d&#8217;ouverture et d&#8217;innovation en a fait la pierre angulaire des travaux modernes sur l&#8217;IA&#8230; <strong>jusqu&#8217;\u00e0 aujourd&#8217;hui.<\/strong><\/p>\n<p>Des recherches r\u00e9centes en mati\u00e8re de cybers\u00e9curit\u00e9 r\u00e9v\u00e8lent une tendance inqui\u00e9tante : des acteurs mena\u00e7ants abusent de l&#8217;infrastructure de confiance de <strong>Hugging Face<\/strong>pour distribuer des logiciels malveillants Android \u00e0 grande \u00e9chelle. Ce faisant, ils exploitent la confiance implicite que les d\u00e9veloppeurs et les syst\u00e8mes de s\u00e9curit\u00e9 accordent aux plateformes \u00e9tablies. Cette \u00e9volution du comportement des attaquants met en \u00e9vidence une surface de risque plus large dans les \u00e9cosyst\u00e8mes d&#8217;IA et souligne la n\u00e9cessit\u00e9 de mettre \u00e0 jour les strat\u00e9gies d\u00e9fensives en mati\u00e8re de cybers\u00e9curit\u00e9.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#d7f0ff&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row column_structure=&#8221;3_5,2_5&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|30px|||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_color=&#8221;#0F2E5C&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>La campagne : De la confiance au cheval de Troie<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Cette menace provient d&#8217;une <strong>campagne de logiciels malveillants pour Android<\/strong> qui abuse de l&#8217;infrastructure d&#8217;h\u00e9bergement de Hugging Face. Selon Bitdefender, l&#8217;attaque repose sur l&#8217;ing\u00e9nierie sociale, incitant les utilisateurs \u00e0 installer une fausse application de s\u00e9curit\u00e9 appel\u00e9e <strong>TrustBastion<\/strong>. <\/p>\n<p>Une fois install\u00e9e, l&#8217;application fonctionne comme un dropper, affichant de fausses invites de mise \u00e0 jour du syst\u00e8me ou de Google Play. Lorsqu&#8217;elle est d\u00e9clench\u00e9e, elle t\u00e9l\u00e9charge et ex\u00e9cute une charge utile malveillante h\u00e9berg\u00e9e sur des ensembles de donn\u00e9es Hugging Face plut\u00f4t que sur des domaines ouvertement malveillants. <\/p>\n<p>En s&#8217;appuyant sur une plateforme de confiance \u00e0 forte r\u00e9putation, les attaquants r\u00e9duisent consid\u00e9rablement la probabilit\u00e9 que les contr\u00f4les de s\u00e9curit\u00e9 traditionnels bloquent ou signalent l&#8217;activit\u00e9, ce qui permet aux logiciels malveillants d&#8217;\u00e9chapper \u00e0 la d\u00e9tection.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|0px|||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.jolera.com\/wp-content\/uploads\/The-Campaign-From-Trust-to-Trojan.jpg&#8221; alt=&#8221;La campagne %22De la confiance au cheval de Troie&#8221; title_text=&#8221;La campagne %22De la confiance au cheval de Troie&#8221; align=&#8221;right&#8221; align_tablet=&#8221;right&#8221; align_phone=&#8221;center&#8221; align_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; width=&#8221;80%&#8221; width_tablet=&#8221;80%&#8221; width_phone=&#8221;80%&#8221; width_last_edited=&#8221;on|phone&#8221; module_alignment=&#8221;right&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; box_shadow_style=&#8221;preset3&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_color=&#8221;#0F2E5C&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Le polymorphisme \u00e0 grande \u00e9chelle : \u00c9chapper \u00e0 la d\u00e9tection<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Ce qui rend cette campagne particuli\u00e8rement efficace (et inqui\u00e9tante), c&#8217;est l&#8217;utilisation du <strong>polymorphisme c\u00f4t\u00e9 serveur<\/strong>. Plut\u00f4t que de servir un fichier APK statique, les attaquants g\u00e9n\u00e8rent automatiquement des milliers de paquets d&#8217;applications Android (APK) uniques avec des variations mineures. Ces innombrables variantes sont t\u00e9l\u00e9charg\u00e9es dans les d\u00e9p\u00f4ts Hugging Face, cr\u00e9ant ainsi un profil de logiciel malveillant en constante \u00e9volution que les syst\u00e8mes de d\u00e9tection bas\u00e9s sur les signatures ont du mal \u00e0 identifier.  <\/p>\n<p>L&#8217;analyse de Bitdefender a r\u00e9v\u00e9l\u00e9 que l&#8217;un de ces d\u00e9p\u00f4ts avait accumul\u00e9 plus de 6 000 commits en moins d&#8217;un mois, avec de nouvelles versions de charges utiles apparaissant environ toutes les 15 minutes. Lorsque ce d\u00e9p\u00f4t a \u00e9t\u00e9 supprim\u00e9, la campagne a rapidement refait surface sous un nouveau nom (Premium Club), avec seulement des changements d&#8217;ic\u00f4nes superficiels tout en conservant des fonctionnalit\u00e9s malveillantes identiques. <\/p>\n<p>Ce niveau d&#8217;automatisation et de mutation rapide des charges utiles montre comment les attaquants industrialisent la distribution des logiciels malveillants, en traitant les plateformes de confiance comme des canaux de distribution non r\u00e9glement\u00e9s, plut\u00f4t que comme de simples outils de d\u00e9veloppement.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#d7f0ff&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row column_structure=&#8221;3_5,2_5&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; custom_padding_last_edited=&#8221;off|desktop&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||false|false&#8221; custom_padding_tablet=&#8221;60px|30px|||false|false&#8221; custom_padding_phone=&#8221;60px|30px|||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_color=&#8221;#0F2E5C&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Les capacit\u00e9s du logiciel malveillant<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Une fois ex\u00e9cut\u00e9e, la charge utile finale fonctionne comme un <strong>cheval de Troie d&#8217;acc\u00e8s \u00e0 distance (RAT)<\/strong>. Il abuse des services d&#8217;accessibilit\u00e9 d&#8217;Android et d&#8217;autres autorisations pour surveiller le comportement de l&#8217;utilisateur, capturer le contenu de l&#8217;\u00e9cran, voler des informations d&#8217;identification et potentiellement exfiltrer des donn\u00e9es sensibles. <\/p>\n<p>Selon <strong>Bleeping Computer<\/strong> et <strong>TechRadar<\/strong>, le logiciel malveillant tente de pr\u00e9senter des interfaces de connexion frauduleuses pour des services financiers largement utilis\u00e9s, dans le but de r\u00e9cup\u00e9rer les informations d&#8217;identification et les codes d&#8217;\u00e9cran de verrouillage de victimes peu m\u00e9fiantes.<\/p>\n<p>Parce qu&#8217;il utilise les services d&#8217;accessibilit\u00e9, le logiciel malveillant peut \u00e9galement contourner les protections habituelles au niveau de l&#8217;utilisateur, ce qui rend la d\u00e9tection et la suppression plus difficiles. Dans certains cas, il bloque la d\u00e9sinstallation, ce qui l&#8217;incite \u00e0 s&#8217;implanter davantage sur l&#8217;appareil compromis. <\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.jolera.com\/wp-content\/uploads\/Malwares-Capabilities.jpg&#8221; alt=&#8221;Capacit\u00e9s des logiciels malveillants&#8221; title_text=&#8221;Capacit\u00e9s des logiciels malveillants&#8221; align=&#8221;right&#8221; align_tablet=&#8221;right&#8221; align_phone=&#8221;center&#8221; align_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; width=&#8221;80%&#8221; module_alignment=&#8221;right&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; box_shadow_style=&#8221;preset3&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_color=&#8221;#0F2E5C&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Pourquoi les plateformes de confiance sont-elles des cibles attrayantes ?<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Cette campagne met en \u00e9vidence un changement radical dans la mani\u00e8re dont les acteurs de la menace consid\u00e8rent la confiance. Historiquement, les acteurs malveillants se sont appuy\u00e9s sur des sites web louches, des domaines d&#8217;hame\u00e7onnage ou des serveurs compromis pour la distribution. Avec l&#8217;essor des r\u00e9seaux de diffusion de contenu (CDN) sophistiqu\u00e9s et des r\u00e9f\u00e9rentiels collaboratifs, les attaquants reconnaissent l&#8217;avantage d&#8217;associer une activit\u00e9 malveillante \u00e0 une infrastructure l\u00e9gitime.  <\/p>\n<p>Les plateformes telles que Hugging Face sont intrins\u00e8quement attrayantes :<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#edf9ff&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; border_width_all=&#8221;3px&#8221; border_color_all=&#8221;#056CF2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#056CF2&#8243; text_font_size=&#8221;22px&#8221; custom_margin=&#8221;||15px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>R\u00e9putation de domaine \u00e9lev\u00e9e<\/strong><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Le trafic provenant des domaines Hugging Face est rarement signal\u00e9 par les outils de s\u00e9curit\u00e9, qui associent la plateforme \u00e0 l&#8217;activit\u00e9 l\u00e9gitime des d\u00e9veloppeurs.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#edf9ff&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; border_width_all=&#8221;3px&#8221; border_color_all=&#8221;#056CF2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#056CF2&#8243; text_font_size=&#8221;22px&#8221; custom_margin=&#8221;||15px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Mod\u00e8le de contribution ouvert<\/strong><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Les utilisateurs peuvent t\u00e9l\u00e9charger des mod\u00e8les et des ensembles de donn\u00e9es avec un minimum de friction, ce qui permet aux attaquants d&#8217;ins\u00e9rer plus facilement des artefacts malveillants qui \u00e9chappent aux filtres initiaux.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#edf9ff&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; border_width_all=&#8221;3px&#8221; border_color_all=&#8221;#056CF2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#056CF2&#8243; text_font_size=&#8221;22px&#8221; custom_margin=&#8221;||15px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Large int\u00e9gration<\/strong><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Les mod\u00e8les et les ensembles de donn\u00e9es de Hugging Face sont int\u00e9gr\u00e9s dans les flux de travail de tous les secteurs, ce qui accro\u00eet l&#8217;exposition et l&#8217;impact potentiel.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Il en r\u00e9sulte un risque pour la cha\u00eene d&#8217;approvisionnement qui ne se limite pas aux chercheurs en IA. M\u00eame les organisations dot\u00e9es de solides d\u00e9fenses contre les logiciels malveillants peuvent \u00e9prouver des difficult\u00e9s \u00e0 d\u00e9tecter les charges utiles malveillantes lorsqu&#8217;elles proviennent d&#8217;un r\u00e9f\u00e9rentiel de confiance. <\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#d7f0ff&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_color=&#8221;#0F2E5C&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Att\u00e9nuations et pratiques d\u00e9fensives<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Les experts en s\u00e9curit\u00e9 soulignent que le risque va au-del\u00e0 des <strong>logiciels malveillants Android<\/strong>. \u00c0 mesure que les attaques de la cha\u00eene d&#8217;approvisionnement par apprentissage automatique deviennent plus courantes, les organisations doivent repenser la mani\u00e8re dont elles int\u00e8grent les actifs d&#8217;IA externes. Voici quelques bonnes pratiques :  <\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;10px|30px|10px|30px|true|true&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; border_width_left=&#8221;5px&#8221; border_color_left=&#8221;#056CF2&#8243; box_shadow_style=&#8221;preset3&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Validation stricte des mod\u00e8les et des ensembles de donn\u00e9es<\/strong><br \/>Adoptez une analyse rigoureuse pour d\u00e9tecter les logiciels malveillants et les codes non s\u00e9curis\u00e9s avant d&#8217;int\u00e9grer des mod\u00e8les externes. Les formats tels que les safetensors, introduits pour att\u00e9nuer les risques de d\u00e9s\u00e9rialisation hostile, devraient \u00eatre privil\u00e9gi\u00e9s par rapport aux formats moins s\u00fbrs tels que les mod\u00e8les bas\u00e9s sur les pickles.   <\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;10px|30px|10px|30px|true|true&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; border_width_left=&#8221;5px&#8221; border_color_left=&#8221;#056CF2&#8243; box_shadow_style=&#8221;preset3&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Sandboxing et isolation<\/strong><br \/>Ex\u00e9cutez des mod\u00e8les ou des codes d&#8217;IA non fiables dans des sandboxes s\u00e9curis\u00e9s afin de contenir les comportements malveillants potentiels.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;10px|30px|10px|30px|true|true&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; border_width_left=&#8221;5px&#8221; border_color_left=&#8221;#056CF2&#8243; box_shadow_style=&#8221;preset3&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Examinez les drapeaux de confiance<\/strong><br \/>\u00c9vitez d&#8217;activer des fonctions telles que trust_remote_code ou trust_repo sans comprendre les implications en termes de s\u00e9curit\u00e9, en particulier dans les syst\u00e8mes de production.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;10px|30px|10px|30px|true|true&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; border_width_left=&#8221;5px&#8221; border_color_left=&#8221;#056CF2&#8243; box_shadow_style=&#8221;preset3&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Surveillance continue<\/strong><br \/>D\u00e9ployez la d\u00e9tection des anomalies et l&#8217;analyse comportementale sur l&#8217;ex\u00e9cution du mod\u00e8le et le comportement de l&#8217;application afin d&#8217;identifier les activit\u00e9s suspectes.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;22px&#8221; background_color=&#8221;#056CF2&#8243; custom_padding=&#8221;10px|30px|10px|30px|true|true&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; border_color_left=&#8221;#056CF2&#8243; box_shadow_style=&#8221;preset3&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Bien qu&#8217;aucune mesure ne permette \u00e0 elle seule d&#8217;\u00e9liminer totalement les risques, une strat\u00e9gie d\u00e9fensive \u00e0 plusieurs niveaux peut r\u00e9duire consid\u00e9rablement la probabilit\u00e9 qu&#8217;un code malveillant atteigne les utilisateurs finaux et ait un impact sur eux.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#d7f0ff&#8221; width=&#8221;60%&#8221; width_tablet=&#8221;60%&#8221; width_phone=&#8221;90%&#8221; width_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;30px|30px|30px|30px|true|true&#8221; border_radii=&#8221;on|12px|12px|12px|12px&#8221; border_width_all=&#8221;3px&#8221; border_color_all=&#8221;#056CF2&#8243; box_shadow_style=&#8221;preset3&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;center&#8221; header_2_text_color=&#8221;#0F2E5C&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Garantir la confiance dans un \u00e9cosyst\u00e8me pilot\u00e9 par l&#8217;IA<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#0F2E5C&#8221; text_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\">La campagne de logiciels malveillants Hugging Face met en \u00e9vidence une dure r\u00e9alit\u00e9 : les plateformes de confiance peuvent involontairement amplifier les menaces sophistiqu\u00e9es. \u00c0 mesure que l&#8217;adoption de l&#8217;IA s&#8217;acc\u00e9l\u00e8re, la surface d&#8217;attaque s&#8217;\u00e9tend au-del\u00e0 de l&#8217;infrastructure traditionnelle, vers les r\u00e9f\u00e9rentiels de mod\u00e8les, les ensembles de donn\u00e9es et les flux de travail de d\u00e9veloppement. <\/p>\n<p style=\"text-align: center;\">La r\u00e9putation n&#8217;est plus un contr\u00f4le. Les organisations doivent traiter les \u00e9cosyst\u00e8mes d&#8217;IA comme une partie de leur p\u00e9rim\u00e8tre de s\u00e9curit\u00e9, avec une surveillance continue, des processus de validation stricts et une gouvernance int\u00e9gr\u00e9e d\u00e8s la conception. <\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#0F2E5C&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; width=&#8221;60%&#8221; width_tablet=&#8221;60%&#8221; width_phone=&#8221;90%&#8221; width_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;center&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Renforcez votre cyberd\u00e9fense contre les menaces fond\u00e9es sur l&#8217;IA<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\">L&#8217;utilisation abusive de l&#8217;IA dans la cha\u00eene d&#8217;approvisionnement constitue un risque op\u00e9rationnel r\u00e9el. Pour l&#8217;att\u00e9nuer, il faut une surveillance continue, une d\u00e9tection avanc\u00e9e des menaces et une r\u00e9ponse rapide aux incidents. <\/p>\n<p style=\"text-align: center;\">Chez Jolera, nous s\u00e9curisons les organisations gr\u00e2ce \u00e0 des services de cybers\u00e9curit\u00e9 g\u00e9r\u00e9s et \u00e0 une protection proactive, tout en soutenant une adoption s\u00fbre de l&#8217;IA avec une gouvernance int\u00e9gr\u00e9e.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; width=&#8221;60%&#8221; width_tablet=&#8221;60%&#8221; width_phone=&#8221;90%&#8221; width_last_edited=&#8221;on|phone&#8221; module_alignment=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;https:\/\/www.jolera.com\/fr\/solutions-de-cybersecurite\/&#8221; button_text=&#8221;D\u00e9couvrez nos solutions de cybers\u00e9curit\u00e9&#8221; button_alignment=&#8221;right&#8221; button_alignment_tablet=&#8221;right&#8221; button_alignment_phone=&#8221;center&#8221; button_alignment_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjIyODYwNCJ9fQ==@&#8221; button_text=&#8221;Contactez nos experts en s\u00e9curit\u00e9&#8221; button_alignment=&#8221;left&#8221; button_alignment_tablet=&#8221;left&#8221; button_alignment_phone=&#8221;center&#8221; button_alignment_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.27.5&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_bg_color=&#8221;#0F2E5C&#8221; button_border_width=&#8221;2px&#8221; button_border_color=&#8221;#056CF2&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Quand les plateformes de confiance v\u00e9hiculent des logiciels malveillantsLe risque \u00e9mergent sur le Hugging FaceDepuis des ann\u00e9es, Hugging Face a \u00e9t\u00e9 adopt\u00e9 par la communaut\u00e9 de l&#8217;intelligence artificielle en tant que plaque tournante pour les mod\u00e8les, les ensembles de donn\u00e9es et le d\u00e9veloppement collaboratif. Souvent compar\u00e9e au &#8220;GitHub de l&#8217;IA&#8221;, la plateforme h\u00e9berge des centaines [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":242666,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[325],"tags":[],"class_list":["post-242672","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualites-it"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Quand les plateformes de confiance v\u00e9hiculent des logiciels malveillants | Jolera<\/title>\n<meta name=\"description\" content=\"De r\u00e9centes campagnes de logiciels malveillants sur Android exploitent la plateforme Hugging Face pour distribuer des charges utiles malveillantes d\u00e9guis\u00e9es en applications de s\u00e9curit\u00e9.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.jolera.com\/fr\/quand-les-plateformes-de-confiance-vehiculent-des-logiciels-malveillants\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quand les plateformes de confiance v\u00e9hiculent des logiciels malveillants | Jolera\" \/>\n<meta property=\"og:description\" content=\"De r\u00e9centes campagnes de logiciels malveillants sur Android exploitent la plateforme Hugging Face pour distribuer des charges utiles malveillantes d\u00e9guis\u00e9es en applications de s\u00e9curit\u00e9.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.jolera.com\/fr\/quand-les-plateformes-de-confiance-vehiculent-des-logiciels-malveillants\/\" \/>\n<meta property=\"og:site_name\" content=\"Jolera\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/jolerainc\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-11T10:41:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-14T14:22:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.jolera.com\/wp-content\/uploads\/Trusted-AI-platforms-arent-immune-to-threats.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jolera\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@jolera\" \/>\n<meta name=\"twitter:site\" content=\"@jolera\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jolera\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.jolera.com\\\/fr\\\/quand-les-plateformes-de-confiance-vehiculent-des-logiciels-malveillants\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.jolera.com\\\/fr\\\/quand-les-plateformes-de-confiance-vehiculent-des-logiciels-malveillants\\\/\"},\"author\":{\"name\":\"Jolera\",\"@id\":\"https:\\\/\\\/www.jolera.com\\\/fr\\\/#\\\/schema\\\/person\\\/9d0aa0ee3c29a585afccdf73a491a1ae\"},\"headline\":\"Quand les plateformes de confiance v\u00e9hiculent des logiciels malveillants\",\"datePublished\":\"2026-02-11T10:41:11+00:00\",\"dateModified\":\"2026-04-14T14:22:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.jolera.com\\\/fr\\\/quand-les-plateformes-de-confiance-vehiculent-des-logiciels-malveillants\\\/\"},\"wordCount\":3919,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.jolera.com\\\/fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.jolera.com\\\/fr\\\/quand-les-plateformes-de-confiance-vehiculent-des-logiciels-malveillants\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.jolera.com\\\/wp-content\\\/uploads\\\/Trusted-AI-platforms-arent-immune-to-threats.png\",\"articleSection\":[\"Actualit\u00e9s IT\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.jolera.com\\\/fr\\\/quand-les-plateformes-de-confiance-vehiculent-des-logiciels-malveillants\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.jolera.com\\\/fr\\\/quand-les-plateformes-de-confiance-vehiculent-des-logiciels-malveillants\\\/\",\"url\":\"https:\\\/\\\/www.jolera.com\\\/fr\\\/quand-les-plateformes-de-confiance-vehiculent-des-logiciels-malveillants\\\/\",\"name\":\"Quand les plateformes de confiance v\u00e9hiculent des logiciels malveillants | Jolera\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.jolera.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.jolera.com\\\/fr\\\/quand-les-plateformes-de-confiance-vehiculent-des-logiciels-malveillants\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.jolera.com\\\/fr\\\/quand-les-plateformes-de-confiance-vehiculent-des-logiciels-malveillants\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.jolera.com\\\/wp-content\\\/uploads\\\/Trusted-AI-platforms-arent-immune-to-threats.png\",\"datePublished\":\"2026-02-11T10:41:11+00:00\",\"dateModified\":\"2026-04-14T14:22:27+00:00\",\"description\":\"De r\u00e9centes campagnes de logiciels malveillants sur Android exploitent la plateforme Hugging Face pour distribuer des charges utiles malveillantes d\u00e9guis\u00e9es en applications de s\u00e9curit\u00e9.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.jolera.com\\\/fr\\\/quand-les-plateformes-de-confiance-vehiculent-des-logiciels-malveillants\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.jolera.com\\\/fr\\\/quand-les-plateformes-de-confiance-vehiculent-des-logiciels-malveillants\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.jolera.com\\\/fr\\\/quand-les-plateformes-de-confiance-vehiculent-des-logiciels-malveillants\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.jolera.com\\\/wp-content\\\/uploads\\\/Trusted-AI-platforms-arent-immune-to-threats.png\",\"contentUrl\":\"https:\\\/\\\/www.jolera.com\\\/wp-content\\\/uploads\\\/Trusted-AI-platforms-arent-immune-to-threats.png\",\"width\":1200,\"height\":628,\"caption\":\"Les plateformes d'IA de confiance ne sont pas \u00e0 l'abri des menaces\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.jolera.com\\\/fr\\\/quand-les-plateformes-de-confiance-vehiculent-des-logiciels-malveillants\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.jolera.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Quand les plateformes de confiance v\u00e9hiculent des logiciels malveillants\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.jolera.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.jolera.com\\\/fr\\\/\",\"name\":\"Global Systems Integrator \u2013 IT & Cybersecurity\",\"description\":\"Global Systems Integrator\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.jolera.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.jolera.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.jolera.com\\\/fr\\\/#organization\",\"name\":\"Jolera\",\"url\":\"https:\\\/\\\/www.jolera.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.jolera.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.jolera.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Jolera-logo-blue-sq.png\",\"contentUrl\":\"https:\\\/\\\/www.jolera.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Jolera-logo-blue-sq.png\",\"width\":400,\"height\":400,\"caption\":\"Jolera\"},\"image\":{\"@id\":\"https:\\\/\\\/www.jolera.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/jolerainc\\\/\",\"https:\\\/\\\/x.com\\\/jolera\",\"https:\\\/\\\/www.instagram.com\\\/jolerainc\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/jolera\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@JoleraTV\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.jolera.com\\\/fr\\\/#\\\/schema\\\/person\\\/9d0aa0ee3c29a585afccdf73a491a1ae\",\"name\":\"Jolera\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0ab3ebeac2608c432d3156ffb0278cff0bd1ad63514020cf8e38525a8e0db098?s=96&d=https%3A%2F%2Fwww.jolera.com%2Fwp-content%2Fuploads%2Fjolera-managed-services-provider-icon-150x150.png&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0ab3ebeac2608c432d3156ffb0278cff0bd1ad63514020cf8e38525a8e0db098?s=96&d=https%3A%2F%2Fwww.jolera.com%2Fwp-content%2Fuploads%2Fjolera-managed-services-provider-icon-150x150.png&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0ab3ebeac2608c432d3156ffb0278cff0bd1ad63514020cf8e38525a8e0db098?s=96&d=https%3A%2F%2Fwww.jolera.com%2Fwp-content%2Fuploads%2Fjolera-managed-services-provider-icon-150x150.png&r=g\",\"caption\":\"Jolera\"},\"sameAs\":[\"https:\\\/\\\/www.jolera.com\"],\"url\":\"https:\\\/\\\/www.jolera.com\\\/fr\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Quand les plateformes de confiance v\u00e9hiculent des logiciels malveillants | Jolera","description":"De r\u00e9centes campagnes de logiciels malveillants sur Android exploitent la plateforme Hugging Face pour distribuer des charges utiles malveillantes d\u00e9guis\u00e9es en applications de s\u00e9curit\u00e9.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.jolera.com\/fr\/quand-les-plateformes-de-confiance-vehiculent-des-logiciels-malveillants\/","og_locale":"fr_FR","og_type":"article","og_title":"Quand les plateformes de confiance v\u00e9hiculent des logiciels malveillants | Jolera","og_description":"De r\u00e9centes campagnes de logiciels malveillants sur Android exploitent la plateforme Hugging Face pour distribuer des charges utiles malveillantes d\u00e9guis\u00e9es en applications de s\u00e9curit\u00e9.","og_url":"https:\/\/www.jolera.com\/fr\/quand-les-plateformes-de-confiance-vehiculent-des-logiciels-malveillants\/","og_site_name":"Jolera","article_publisher":"https:\/\/www.facebook.com\/jolerainc\/","article_published_time":"2026-02-11T10:41:11+00:00","article_modified_time":"2026-04-14T14:22:27+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.jolera.com\/wp-content\/uploads\/Trusted-AI-platforms-arent-immune-to-threats.png","type":"image\/png"}],"author":"Jolera","twitter_card":"summary_large_image","twitter_creator":"@jolera","twitter_site":"@jolera","twitter_misc":{"Written by":"Jolera","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.jolera.com\/fr\/quand-les-plateformes-de-confiance-vehiculent-des-logiciels-malveillants\/#article","isPartOf":{"@id":"https:\/\/www.jolera.com\/fr\/quand-les-plateformes-de-confiance-vehiculent-des-logiciels-malveillants\/"},"author":{"name":"Jolera","@id":"https:\/\/www.jolera.com\/fr\/#\/schema\/person\/9d0aa0ee3c29a585afccdf73a491a1ae"},"headline":"Quand les plateformes de confiance v\u00e9hiculent des logiciels malveillants","datePublished":"2026-02-11T10:41:11+00:00","dateModified":"2026-04-14T14:22:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.jolera.com\/fr\/quand-les-plateformes-de-confiance-vehiculent-des-logiciels-malveillants\/"},"wordCount":3919,"commentCount":0,"publisher":{"@id":"https:\/\/www.jolera.com\/fr\/#organization"},"image":{"@id":"https:\/\/www.jolera.com\/fr\/quand-les-plateformes-de-confiance-vehiculent-des-logiciels-malveillants\/#primaryimage"},"thumbnailUrl":"https:\/\/www.jolera.com\/wp-content\/uploads\/Trusted-AI-platforms-arent-immune-to-threats.png","articleSection":["Actualit\u00e9s IT"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.jolera.com\/fr\/quand-les-plateformes-de-confiance-vehiculent-des-logiciels-malveillants\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.jolera.com\/fr\/quand-les-plateformes-de-confiance-vehiculent-des-logiciels-malveillants\/","url":"https:\/\/www.jolera.com\/fr\/quand-les-plateformes-de-confiance-vehiculent-des-logiciels-malveillants\/","name":"Quand les plateformes de confiance v\u00e9hiculent des logiciels malveillants | Jolera","isPartOf":{"@id":"https:\/\/www.jolera.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.jolera.com\/fr\/quand-les-plateformes-de-confiance-vehiculent-des-logiciels-malveillants\/#primaryimage"},"image":{"@id":"https:\/\/www.jolera.com\/fr\/quand-les-plateformes-de-confiance-vehiculent-des-logiciels-malveillants\/#primaryimage"},"thumbnailUrl":"https:\/\/www.jolera.com\/wp-content\/uploads\/Trusted-AI-platforms-arent-immune-to-threats.png","datePublished":"2026-02-11T10:41:11+00:00","dateModified":"2026-04-14T14:22:27+00:00","description":"De r\u00e9centes campagnes de logiciels malveillants sur Android exploitent la plateforme Hugging Face pour distribuer des charges utiles malveillantes d\u00e9guis\u00e9es en applications de s\u00e9curit\u00e9.","breadcrumb":{"@id":"https:\/\/www.jolera.com\/fr\/quand-les-plateformes-de-confiance-vehiculent-des-logiciels-malveillants\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.jolera.com\/fr\/quand-les-plateformes-de-confiance-vehiculent-des-logiciels-malveillants\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.jolera.com\/fr\/quand-les-plateformes-de-confiance-vehiculent-des-logiciels-malveillants\/#primaryimage","url":"https:\/\/www.jolera.com\/wp-content\/uploads\/Trusted-AI-platforms-arent-immune-to-threats.png","contentUrl":"https:\/\/www.jolera.com\/wp-content\/uploads\/Trusted-AI-platforms-arent-immune-to-threats.png","width":1200,"height":628,"caption":"Les plateformes d'IA de confiance ne sont pas \u00e0 l'abri des menaces"},{"@type":"BreadcrumbList","@id":"https:\/\/www.jolera.com\/fr\/quand-les-plateformes-de-confiance-vehiculent-des-logiciels-malveillants\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.jolera.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Quand les plateformes de confiance v\u00e9hiculent des logiciels malveillants"}]},{"@type":"WebSite","@id":"https:\/\/www.jolera.com\/fr\/#website","url":"https:\/\/www.jolera.com\/fr\/","name":"Global Systems Integrator \u2013 IT & Cybersecurity","description":"Global Systems Integrator","publisher":{"@id":"https:\/\/www.jolera.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.jolera.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.jolera.com\/fr\/#organization","name":"Jolera","url":"https:\/\/www.jolera.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.jolera.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.jolera.com\/wp-content\/uploads\/2024\/10\/Jolera-logo-blue-sq.png","contentUrl":"https:\/\/www.jolera.com\/wp-content\/uploads\/2024\/10\/Jolera-logo-blue-sq.png","width":400,"height":400,"caption":"Jolera"},"image":{"@id":"https:\/\/www.jolera.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/jolerainc\/","https:\/\/x.com\/jolera","https:\/\/www.instagram.com\/jolerainc\/","https:\/\/www.linkedin.com\/company\/jolera\/","https:\/\/www.youtube.com\/@JoleraTV"]},{"@type":"Person","@id":"https:\/\/www.jolera.com\/fr\/#\/schema\/person\/9d0aa0ee3c29a585afccdf73a491a1ae","name":"Jolera","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/0ab3ebeac2608c432d3156ffb0278cff0bd1ad63514020cf8e38525a8e0db098?s=96&d=https%3A%2F%2Fwww.jolera.com%2Fwp-content%2Fuploads%2Fjolera-managed-services-provider-icon-150x150.png&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0ab3ebeac2608c432d3156ffb0278cff0bd1ad63514020cf8e38525a8e0db098?s=96&d=https%3A%2F%2Fwww.jolera.com%2Fwp-content%2Fuploads%2Fjolera-managed-services-provider-icon-150x150.png&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0ab3ebeac2608c432d3156ffb0278cff0bd1ad63514020cf8e38525a8e0db098?s=96&d=https%3A%2F%2Fwww.jolera.com%2Fwp-content%2Fuploads%2Fjolera-managed-services-provider-icon-150x150.png&r=g","caption":"Jolera"},"sameAs":["https:\/\/www.jolera.com"],"url":"https:\/\/www.jolera.com\/fr\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.jolera.com\/fr\/wp-json\/wp\/v2\/posts\/242672","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.jolera.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.jolera.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.jolera.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jolera.com\/fr\/wp-json\/wp\/v2\/comments?post=242672"}],"version-history":[{"count":0,"href":"https:\/\/www.jolera.com\/fr\/wp-json\/wp\/v2\/posts\/242672\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.jolera.com\/fr\/wp-json\/wp\/v2\/media\/242666"}],"wp:attachment":[{"href":"https:\/\/www.jolera.com\/fr\/wp-json\/wp\/v2\/media?parent=242672"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.jolera.com\/fr\/wp-json\/wp\/v2\/categories?post=242672"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.jolera.com\/fr\/wp-json\/wp\/v2\/tags?post=242672"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}