all-in-one privacy solution":["Proton Unlimited est une solution tout-en-un respectueuse de la vie privée"],"Black Friday":["Black Friday"],"No ads. Privacy by default.":["Aucune publicité, le respect de la vie privée comme règle absolue"],"People before profits":["Les individus passent avant les profits"],"Security through transparency":["Notre engagement de transparence"],"The best Proton Mail ${ BLACK_FRIDAY } deals":["Les meilleures offres ${ BLACK_FRIDAY } de Proton Mail"],"The world’s only community- supported email service":[" La seule messagerie au monde soutenue par la communauté"]},"specialoffer:limited":{"${ hours } hour":["${ hours } heure","${ hours } heures"],"${ hoursLeft }, ${ minutesLeft } and ${ secondsLeft } left":["Temps restant : ${ hoursLeft }, ${ minutesLeft }, ${ secondsLeft }"],"${ minutes } minute":["${ minutes } minute","${ minutes } minutes"],"${ seconds } second":["${ seconds } seconde","${ seconds } secondes"],"Limited time offer":["Offre à durée limitée"]},"specialoffer:listitem":{"Create multiple addresses":["Créez plusieurs adresses"],"Hide-my-email aliases":["Alias « hide-my-email »"],"Quickly unsubscribe from newsletters":["Désabonnez-vous rapidement des newsletters"],"Use your own domain name":["Utilisez votre propre nom de domaine"]},"specialoffer:logos":{"As featured in":["Ils en parlent"]},"specialoffer:metadescription":{"Get an encrypted email that protects your privacy":["Choisissez une messagerie électronique chiffrée qui protège votre vie privée"]},"specialoffer:metatitle":{"Proton Mail Black Friday Sale - Up to 40% off":["Offre Proton Mail Black Friday - Jusqu'à 40 % de réduction"]},"specialoffer:newmetadescription":{"Get up to 40% off Proton Mail subscriptions this Black Friday. Find great deals on our secure end-to-end encrypted email plans.":["Obtenez jusqu'à 40 % de réduction sur les abonnements Proton Mail à l'occasion du Black Friday. Profitez d'offres exceptionnelles sur nos abonnements de messagerie électronique sécurisée et chiffrée de bout en bout."]},"specialoffer:newmetatitle":{"Proton Mail Black Friday sale | Up to 40% off secure email":["Offre Black Friday Proton Mail | Jusqu'à 40 % de réduction"]},"specialoffer:note":{"* Billed at ${ TOTAL_SUM } for the first year":["* Facturé ${ TOTAL_SUM } pour la première année"],"*Billed at ${ TOTAL_SUM } for the first 2 years":["*Facturé ${ TOTAL_SUM } pour les 2 premières années"],"30-day money-back guarantee":["Garantie satisfait ou remboursé pendant 30 jours"],"Billed at ${ TOTAL_SUM } for the first 2 years":["Facturé ${ TOTAL_SUM } pour les 2 premières années"],"Billed at ${ TOTAL_SUM } for the first year":["Facturé ${ TOTAL_SUM } pour la première année"],"You save ${ SAVE_SUM }":["Vous économisez ${ SAVE_SUM }"]},"specialoffer:off":{"${ PERCENT_OFF } off":["-${ PERCENT_OFF }"]},"specialoffer:testimonial":{"I love my ProtonMail":["J'adore mon ProtonMail"],"My favorite email service":["Ma messagerie électronique préférée"],"Thanks Proton for keeping us all safe in the complicated internet universe.":["Merci Proton de nous garder en sécurité dans l'univers complexe d'internet."],"You get what you pay for. In the case of big tech, if you pay nothing, you get used. I quit using Gmail and switched to @ProtonMail":["Vous avez ce pour quoi vous payez. Avec les Big Tech, si vous ne payez rien, vous êtes utilisé. J'ai arrêté d'utiliser Gmail et je suis passée @ProtonMail"]},"specialoffer:time":{"Days":["Jours"],"Hours":["Heures"],"Min":["Min"]},"specialoffer:title":{"And much more":["Et aussi"],"Safe from trackers":["À l'abri des traqueurs"],"Stay organized":["Restez organisé(e)"],"Black Friday email deals":["Offres Black Friday pour la messagerie électronique"],"Don’t just take our word for it":["Ce qu'en disent nos utilisateurs"],"Make your inbox yours":["Appropriez-vous totalement votre boîte de réception"],"Our story":["Notre histoire"],"Transfer your data from Google in one click":["Transférez vos données depuis Google en un clic"]},"specialoffer:tooltip":{"Access blocked content and browse privately. Includes ${ TOTAL_VPN_SERVERS }+ servers in ${ TOTAL_VPN_COUNTRIES }+ countries, connect up to 10 devices, access worldwide streaming services, malware and ad-blocker, and more.":["Accédez aux contenus bloqués et naviguez en toute confidentialité. Comprend plus de ${ TOTAL_VPN_SERVERS } serveurs dans plus de ${ TOTAL_VPN_COUNTRIES } pays, la possibilité de connecter jusqu'à 10 appareils, l'accès aux services de streaming dans le monde entier, un bloqueur de logiciels malveillants et de publicités et bien plus encore."],"Easily share your calendar with your family, friends or colleagues, and view external calendars.":["Partagez facilement votre calendrier avec votre famille, vos amis ou collègues et consultez des calendriers externes."],"Includes support for 1 custom email domain, 10 email addresses, 10 hide-my-email aliases, calendar sharing, and more.":["Comprend la prise en charge de 1 domaine de messagerie personnalisé, de 10 adresses e-mail, de 10 alias « hide-my-email », du partage de calendriers et bien d'autres fonctionnalités."],"Includes support for 3 custom email domains, 15 email addresses, unlimited hide-my-email aliases, calendar sharing, and more.":["Comprend la prise en charge de 3 domaines de messagerie personnalisés, de 15 adresses e-mail, d'un nombre illimité d'alias « hide-my-email », du partage de calendriers et bien d'autres fonctionnalités."],"Manage up to 25 calendars, mobile apps, secured with end-to-end encryption, 1-click calendar import from Google, and more.":["Jusqu'à 25 calendriers, des applications mobiles, la sécurité avec le chiffrement de bout en bout, l'importation de calendrier en un clic depuis Google..."]},"Status Banner":{"At the moment we are experiencing issues with the Proton VPN service":["Nous rencontrons actuellement des problèmes avec le service Proton VPN."]},"Status banner":{"Learn more":["En savoir plus"],"Please note that at the moment we are experiencing issues with the ${ issues[0] } service.":["Nous rencontrons actuellement des problèmes avec le service ${ issues[0] }."],"We are experiencing issues with one or more services at the moment.":["Nous rencontrons actuellement des problèmes avec un ou plusieurs services."]},"steps":{"Step":["Étape"]},"suggestions":{"Suggestions":["Suggestions"]},"Support":{"Sub category":["Sous-catégorie","Sous-catégories"]},"Support article":{"${ readingTime } min":["${ readingTime } minute","${ readingTime } minutes"],"Category":["Catégorie","Catégories"],"Didn’t find what you were looking for?":["Vous ne trouvez pas ce que vous cherchez ?"],"General contact":["Contact - Général"],"Get help":["Obtenir de l'aide"],"Legal contact":["Contact - Juridique"],"Media contact":["Contact - Média"],"Partnerships contact":["Contact - Partenariats"],"Reading":["Lecture"]},"Support Form Platform option":{"VPN for Android TV":["VPN pour Android TV"],"VPN for Apple TV":["VPN pour Apple TV"],"VPN for Chromebook":["VPN pour Chromebook"]},"Support troubleshooting":{"App version":["Version de l'application"],"Browser":["Navigateur"],"Check if this helps":["Vérifiez si cela vous aide."],"Choose a product":["Choisir un produit"],"Did this solve your issue?":["Cela a-t-il résolu votre problème ?"],"Faster assistance is just a few clicks away":["Quelques clics suffisent pour obtenir une assistance plus rapide"],"How can we help?":["Comment pouvons-nous vous aider ?"],"No, contact support":["Non, contacter le support"],"Please fill out one field after another":["Veuillez remplir les champs l'un après l'autre"],"Please make your selections":["Veuillez faire vos sélections"],"Proton account":["Compte Proton"],"Proton for Business":["Proton for Business"],"Thank you for your feedback":["Nous vous remercions pour votre commentaire."],"What can we help with?":["En quoi pouvons-nous vous aider ?"],"Yes":["Oui"]},"support_modal_search_query":{"Search query":["Recherche"]},"support_search_button":{"Search":["Rechercher"]},"support_search_i_am_looking_for":{"I'm looking for":["Je recherche des informations sur..."]},"SupportForm":{"For a faster resolution, please report the issue from the Bridge app: Help > Report a problem.":["Pour que le problème soit résolu plus rapidement, vous pouvez le signaler à partir de l'application Bridge : Aide > Signaler un bug."],"Information":["Informations"]},"SupportForm:option":{"Account Security":["Sécurité du compte"],"Contacts":["Contacts"],"Custom email domain":["Domaine de messagerie personnalisé"],"Email delivery and Spam":["Distribution des messages et indésirables/spam"],"Encryption":["Chiffrement"],"Login and password":["Identifiant et mot de passe"],"Merge aliases and accounts":["Fusion des alias et des comptes"],"Migrate to Proton":["Migration vers Proton"],"Notifications":["Notifications"],"Other":["Autre"],"Plans and billing":["Abonnements et facturation"],"Proton for Business":["Proton for Business"],"Sign up":["Inscription"],"Storage":["Espace de stockage"],"Users, addresses, and identities":["Utilisateurs, adresses et identités"]},"SupportForm:optionIntro":{"Select a topic":["Choisissez un sujet"]},"Testimonial":{"Awards":["Récompenses"],"Customers":["Clients"],"Featured":["Ils en parlent"],"Go to testimonial source":["Accéder aux commentaires"],"Open source of award":["Voir l'information originale concernant ce prix"],"Open source of quote":["Voir l'information originale concernant cette citation"],"Reviews":["Avis"],"Videos":["Vidéos"],"Watch on TikTok":["Regarder sur TikTok"],"Watch on YouTube":["Regarder sur YouTube"]},"TestimonialCategory":{"Awards":["Récompenses"],"Customers":["Clients"],"Featured":["Ils en parlent"],"Media":["Média"],"Reviews":["Avis"],"Videos":["Des vidéos"]},"Text":{"If you need help, check out our ${ supportLink }.":["Si vous avez besoin d'aide, consultez notre ${ supportLink }."],"The page you’re looking for might have been removed, or it could be an\nold link.":["La page recherchée a peut-être été retirée ou le lien utilisé n'est plus valide."],"Your question may already have an answer in our knowledge base:":["La réponse à votre question se trouve peut-être déjà dans notre base de connaissances :"]},"Title":{"On this page":["Sur cette page"],"Page not found":["Page introuvable"],"Related articles":["Articles similaires"],"Share ${ thisPage }":["Partagez ${ thisPage }"],"Switch to Proton Pass - Contact us":["Passez à Proton Pass - Contactez-nous"],"Thank you!":["Merci !"],"this page":["cette page"]},"tooltip_vpn":{"Access blocked content and browse privately. Includes ${ TOTAL_VPN_SERVERS }+ servers in ${ TOTAL_VPN_COUNTRIES }+ countries, highest VPN speed, ${ TOTAL_VPN_CONNECTIONS } VPN connections, worldwide streaming services, malware and ad-blocker, and more.":["Accédez aux contenus bloqués et naviguez en toute confidentialité. Comprend plus de ${ TOTAL_VPN_SERVERS } serveurs dans plus de ${ TOTAL_VPN_COUNTRIES } pays, la vitesse VPN la plus élevée, ${ TOTAL_VPN_CONNECTIONS } connexions VPN, l'accès aux services de streaming dans le monde entier, un bloqueur de logiciels malveillants et de publicités et bien plus encore."]},"vpn_servers":{"Get Proton VPN Plus":["Je choisis Proton VPN Plus"]},"wallet_signup_2024:Action":{"Get Proton Wallet":["Obtenir Proton Wallet"]},"wallet_signup_2024:Homepage hero product link title":{"Wallet":["Wallet"]},"wallet_signup_2024:Homepage product navigation bar":{"Wallet":["Wallet"]},"wallet_signup_2024:menu item":{"Bitcoin guide":["Guide de Bitcoin"],"Proton Wallet news":["Actualités Proton Wallet"],"Proton Wallet support":["Support Proton Wallet"]},"wallet_signup_2024:Pricing":{"Includes everything in Proton Unlimited and":["Comprend tout ce qui est inclus dans Proton Unlimited et"],"Limited availability":["Disponibilité limitée"],"The easiest way to securely own, send, and receive Bitcoin":["Le moyen le plus simple et sécurisé pour détenir et échanger des bitcoins"]},"wallet_signup_2024:ProductRange":{"Discover Proton Wallet":["Découvrez Proton Wallet"],"Store and transact Bitcoin privately with an encrypted self-custody wallet.":["Conservez et échangez des bitcoins en toute sécurité grâce à notre portefeuille chiffré en auto-gestion."]},"wallet_signup_2024:wallet bitcoin":{"Learn about Bitcoin, the Internet's value network.":["Découvrez le monde du Bitcoin, le réseau de valeur sur Internet."]},"wallet_signup_2024:wallet overview":{"Ensure you're always in control of your Bitcoin.":["Restez maître de vos bitcoins en toutes circonstances."]},"wallet_signup_2024:wallet security":{"The encrypted, open-source wallet that puts you in control.":["Contrôlez vos bitcoins de A à Z avec notre portefeuille chiffré open source."]}}},"base":"blog","cdn":{"enabledForAssets":true,"enabledForImages":true,"url":"https://pmecdn.protonweb.com/"},"unleashApi":"https://account.proton.me/api"};
window.frameworkContext = frameworkContext;
const context = frameworkContext.base === '' ? '' : `${frameworkContext.base}/`;
window.__toAssetUrl = (filename) => {
if (frameworkContext.cdn !== undefined && frameworkContext.cdn.enabledForAssets === true) {
return `${frameworkContext.cdn.url}${context}${filename}`;
} else {
return `/${context}${filename}`;
}
};
})();
The Microsoft Exchange hack might be one of the worst breaches of all time – We need a new approach to email security | Proton
Over the past two weeks, Microsoft clients using its Exchange servers, which includes tens of thousands of government agencies and private corporations around the world, have fallen victim to a series of hacks that have compromised their data. The breach started with a group of state-sponsored hackers attributed to China known as Hafnium, but more and more actors jumped into the fray after some of the exploits became public.
This is a serious breach that has exposed private user data as well as corporate and state secrets, materially damaging many small and medium-sized businesses and undermining trust in many government agencies. It is also a prime example of how the current approach to user privacy and security is failing.
A timeline of the Microsoft Exchange Server hack
March 2: Microsoft announced that hackers, dubbed Hafnium, were using multiple 0-day exploits (i.e., previously undiscovered vulnerabilities) to remotely access its Exchange servers and steal data from its corporate and government users.
Essentially, these hackers took three steps and exploited four separate vulnerabilities:
Hafnium gained access to Microsoft Exchange servers by taking advantage of stolen passwords and a previously undiscovered server-side request vulnerability to make itself appear to the Exchange server as someone who should have access.
The attackers then created a web shell, or a backdoor that allows browser-based access to the server to anyone that knows the web shell’s URL.
Hafnium then used the web shells to execute malicious code on the server remotely. Once in, the attackers could steal data, escalate privileges, or hold data ransom.
Microsoft responded by releasing emergency security patches for the affected systems (Exchange Server 2019-2013) and sent out a free patch to cover Exchange Server 2010, suggesting these vulnerabilities may have existed for the past 10 years.
Two weeks after Microsoft’s initial announcement, experts estimated there were still tens of thousands of Microsoft Exchange Servers that needed to be patched. Furthermore, state-sponsored hackers had already begun exploiting sensitive systems well before Microsoft became aware of the problem.
March 11: Microsoft detected that some of the servers compromised by Hafnium were being infected by a new type of ransomware known as DearCry.
Multiple attackers began exploiting the same vulnerabilities as Hafnium to gain access to Microsoft Exchange Servers. They committed various attacks, including DearCry, which makes copies of target files, encrypts those copies, and then deletes the originals.
March 11 to March 15: The daily attacks attempted on Microsoft Exchange Servers increased 10 times, from roughly 700 to over 7200(nouvelle fenêtre).
Experts estimate that almost 60,000 organizations(nouvelle fenêtre) (and maybe even more) could have been affected, ranging from small and medium-sized businesses up to the European Banking Authority. The majority of the DearCry attacks have focused on government and military organizations, followed by manufacturing and financial services, while the most attacked country has been the US, followed by Germany and the UK.
Security is hard
Almost every major technology company has had significant security incidents in the past. Microsoft itself also has a long history of security vulnerabilities in its products. The lesson to take away from these attacks’ success is not that these organizations are negligent or incompetent, but that security is hard.
In this incident, Microsoft was not attacked directly, but rather, hackers went after tens of thousands of organizations that run Microsoft Exchange software for their email. Regardless of whether it is Google, Microsoft, or their customers, cybersecurity is a form of asymmetric warfare.
Defenders must protect all possible entry points, while attackers only need to find a single weakness to get in.
A successful defense therefore needs to have multiple layers of security so that if one layer is breached, successive layers can keep attackers away from sensitive business data. When it comes to email, Proton Mail achieves this by utilizing zero-access encryption(nouvelle fenêtre).
Whenever possible, Proton Mail encrypts an organization’s email on the client side. Even emails received from outside of an organization are encrypted before they are saved. The encryption is done in a way that prevents even Proton Mail itself from having the means to independently decrypt user data. This adds an extra layer of security because breaching a Proton Mail server does not necessarily expose user emails. Unlike in the case of Microsoft Exchange (or Gmail or any other regular email service that does not utilize zero-access encryption), a hacker would still need to find a way to decrypt the messages.
You can’t expose data you don’t have access to
Proton Mail’s security model has prepared for a breach by investing in a technology that applies an extra layer of encryption to all messages on our servers.
Our zero-access encryption means we cannot access or read any user’s messages. Hackers cannot steal from us what we do not have access to. So even if Proton Mail ever were to be breached, a successful data exfiltration attack would be far harder to execute.
So why don’t all companies protect their users’ data with end-to-end or zero-access encryption? For one, strong encryption is difficult to do. The technology that underpins Proton Mail required years of research and work and was developed by scientists from CERN under the scrutiny of the open source community and independent security audits.
Then, there is also the issue of the business model a company uses. Corporations like Google make money by exploiting user data to sell ads. This is incompatible with technologies that prevent them from accessing user data, even if they are more secure.
This is not the first major security breach, nor will it be the last. And there is no reason to single out Microsoft. In fact, such an incident would have been exponentially worse if it had happened to Google or Facebook due to the significantly larger amounts of sensitive personal information stored by those companies. Protecting against risks like this is one of the reasons that millions of individuals and small and medium-sized businesses have switched to Proton Mail.
Encrypt all the data you can
Proton relies on user subscriptions for revenue, not leveraging our users’ data or selling access to advertisers. This makes us relatively unique among tech companies in that we do not need to access or abuse our users’ data for our business model to work. It’s not just better for privacy, it is better for security. We believe that this approach leads to a better internet that serves the interest of all people.