{"id":1415,"date":"2022-02-28T10:00:17","date_gmt":"2022-02-28T09:00:17","guid":{"rendered":"https:\/\/cyber-detect.com\/?p=1415"},"modified":"2022-02-28T10:00:18","modified_gmt":"2022-02-28T09:00:18","slug":"lockergoga-crushed-by-gorille","status":"publish","type":"post","link":"https:\/\/cyber-detect.com\/en\/lockergoga-crushed-by-gorille\/","title":{"rendered":"LOCKERGOGA crushed by GORILLE\u00a9 \u0003"},"content":{"rendered":"<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Author : Jean-Yves Marion<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Co-writer: Fabrice Sabatier<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><strong>Today, we start our blog. Our goal is to illustrate the uses of the software we develop at CYBER-DETECT. The recent LockerGoga attacks against Altran in France [1] and Norsk Hydro in Norway [2] illustrate the need for advanced anti-malware defenses. The attack in France took place in January and the one in Norway in March. These attacks should have been stopped. That is why we start with this post today. Indeed, the GORILLE behavior engine designed by CYBER-DETECT allows detecting LockerGoga and its variants without signature.<\/strong><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>In a nutshell, GORILLE identifies malicious threats embedded in Linux, MacOS and Windows binaries. To do this, GORILLE knows a collection of malicious behaviors. Each binary file submitted to GORILLE is then analyzed and as soon as a set of malicious behaviors between links is detected, GORILLE issues an alert. There&#8217;s no magic behind it, just several years of hard work in the Loria computer lab. But I think we&#8217;ll come back to how GORILLE works in a future post, and for now, let&#8217;s get back to LockerGoga.<br>Since GORILLE&#8217;s search process is based on a collection of malicious behaviors, the first question that comes to mind is whether GORILLE is capable of detecting LockerGoga. GORILLE knows about 100,000 malicious behaviors. And GORILLE identifies 55 malicious behaviors in the submitted LockerGoga sample.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"628\" height=\"78\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/11\/BLOG_LockerGoga_Img1.png\" alt=\"\" class=\"wp-image-960\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/11\/BLOG_LockerGoga_Img1.png 628w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/11\/BLOG_LockerGoga_Img1-300x37.png 300w\" sizes=\"auto, (max-width: 628px) 100vw, 628px\" \/><\/figure>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>The sample named LockerGogaAltran.bin [3] matches the malware that attacks Altran on January 25, 2019. On March 8, 2019, two months later, MalwareHunter [4] discovered that a variant of LockerGoga, which we name here no-detected_LockerGoga.bin, was not detected by all Virus Total antivirus products [5].<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"609\" height=\"546\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/11\/BLOG_LockerGoga_Img2.png\" alt=\"\" class=\"wp-image-962\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/11\/BLOG_LockerGoga_Img2.png 609w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/11\/BLOG_LockerGoga_Img2-300x269.png 300w\" sizes=\"auto, (max-width: 609px) 100vw, 609px\" \/><\/figure>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>As seen below, GORILLE detects 55 malicious behaviors in the yet undetected LockerGoga sample, which are identical to the ones previously identified! GORILLE&#8217;s technological advancement makes it possible to stop unknown threat variants.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"628\" height=\"82\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/11\/BLOG_LockerGoga_Img3.png\" alt=\"\" class=\"wp-image-964\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/11\/BLOG_LockerGoga_Img3.png 628w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/11\/BLOG_LockerGoga_Img3-300x39.png 300w\" sizes=\"auto, (max-width: 628px) 100vw, 628px\" \/><\/figure>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>In fact, we can play with GORILLE a bit more. In fact, GORILLE is able to learn the specific malicious features of LockerGoga by itself.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"626\" height=\"78\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/11\/BLOG_LockerGoga_Img4.png\" alt=\"\" class=\"wp-image-966\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/11\/BLOG_LockerGoga_Img4.png 626w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/11\/BLOG_LockerGoga_Img4-300x37.png 300w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/figure>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>GORILLE finds 24632 sites in LockerGoga, which represent 24632 seen behaviors, and not only bad ones. This is because LockerGoga incorporates, like all software, third-party libraries from Microsoft and open source libraries. Collectively, the third-party libraries also indicate behaviors. That said, we can compare all the behaviors of LockerGogaAltran.bin, which was involved in the Altran incident, and LockerGoga.bin not detected by MalwareHunter.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"626\" height=\"63\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/11\/BLOG_LockerGoga_Img5.png\" alt=\"\" class=\"wp-image-968\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/11\/BLOG_LockerGoga_Img5.png 626w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/11\/BLOG_LockerGoga_Img5-300x30.png 300w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/figure>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>There are 17951 common behaviors, about half, that are common to both samples. Then, using our binsim tool from the GORILLE expert suite, we can synchronize the two codes, i.e. find the correspondence between the functions of LockerGogaAltran.bin and no-detected_LockerGoga.bin. Here is an excerpt from the output of binsim:<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"626\" height=\"61\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/11\/BLOG_LockerGoga_Img6.png\" alt=\"\" class=\"wp-image-970\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/11\/BLOG_LockerGoga_Img6.png 626w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/11\/BLOG_LockerGoga_Img6-300x29.png 300w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/figure>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>It shows that the code of no-detected_LockerGoga.bin at address 0x4c6a9ah is very similar to the one at address 0x4caec8h. And this is confirmed by IDA as shown in the figure below:<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"552\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/11\/BLOG_LockerGoga_Img7-1024x552.png\" alt=\"\" class=\"wp-image-972\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/11\/BLOG_LockerGoga_Img7-1024x552.png 1024w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/11\/BLOG_LockerGoga_Img7-300x162.png 300w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/11\/BLOG_LockerGoga_Img7-768x414.png 768w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/11\/BLOG_LockerGoga_Img7.png 1383w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><strong>Similarly, GORILLE shows that the LockerGoga_Norsk-Hydro.exe sample involved in the March 2019 Norsk Hydro attack again exhibits 50% similar behavior.<\/strong><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"630\" height=\"65\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/11\/BLOG_LockerGoga_Img8.png\" alt=\"\" class=\"wp-image-974\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/11\/BLOG_LockerGoga_Img8.png 630w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/11\/BLOG_LockerGoga_Img8-300x31.png 300w\" sizes=\"auto, (max-width: 630px) 100vw, 630px\" \/><\/figure>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p><strong>The conclusion is that GORILLE would have detected LockerGoga_Norsk-Hydro and stopped the attack, just as it could have detected the Altran attack. When we know that the most serious attacks come from unknown threats or freshly repackaged legacy malware, which mostly go unnoticed, we need applications that think outside the box and GORILLE is one of them!<\/strong><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>The recent LockerGoga attacks against Altran in France [1] and Norsk Hydro in Norway [2] illustrate the need for advanced anti-malware defenses. <\/p>\n","protected":false},"author":1,"featured_media":33,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[13],"tags":[],"class_list":["post-1415","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualites-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>LOCKERGOGA crushed by GORILLE\u00a9 \u0003 - Cyber-Detect<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyber-detect.com\/en\/lockergoga-crushed-by-gorille\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LOCKERGOGA crushed by GORILLE\u00a9 \u0003 - Cyber-Detect\" \/>\n<meta property=\"og:description\" content=\"The recent LockerGoga attacks against Altran in France [1] and Norsk Hydro in Norway [2] illustrate the need for advanced anti-malware defenses.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyber-detect.com\/en\/lockergoga-crushed-by-gorille\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber-Detect\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-28T09:00:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-02-28T09:00:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/shahadat-rahman-BfrQnKBulYQ-unsplash-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"adminbilliotte\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"adminbilliotte\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cyber-detect.com\/en\/lockergoga-crushed-by-gorille\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/lockergoga-crushed-by-gorille\/\"},\"author\":{\"name\":\"adminbilliotte\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#\/schema\/person\/9bc85be73e00a52bbc3294f538e0ae47\"},\"headline\":\"LOCKERGOGA crushed by GORILLE\u00a9 \\u0003\",\"datePublished\":\"2022-02-28T09:00:17+00:00\",\"dateModified\":\"2022-02-28T09:00:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/lockergoga-crushed-by-gorille\/\"},\"wordCount\":553,\"publisher\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/lockergoga-crushed-by-gorille\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/shahadat-rahman-BfrQnKBulYQ-unsplash-scaled.jpg\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyber-detect.com\/en\/lockergoga-crushed-by-gorille\/\",\"url\":\"https:\/\/cyber-detect.com\/en\/lockergoga-crushed-by-gorille\/\",\"name\":\"LOCKERGOGA crushed by GORILLE\u00a9 \\u0003 - Cyber-Detect\",\"isPartOf\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/lockergoga-crushed-by-gorille\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/lockergoga-crushed-by-gorille\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/shahadat-rahman-BfrQnKBulYQ-unsplash-scaled.jpg\",\"datePublished\":\"2022-02-28T09:00:17+00:00\",\"dateModified\":\"2022-02-28T09:00:18+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/lockergoga-crushed-by-gorille\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyber-detect.com\/en\/lockergoga-crushed-by-gorille\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyber-detect.com\/en\/lockergoga-crushed-by-gorille\/#primaryimage\",\"url\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/shahadat-rahman-BfrQnKBulYQ-unsplash-scaled.jpg\",\"contentUrl\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/shahadat-rahman-BfrQnKBulYQ-unsplash-scaled.jpg\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyber-detect.com\/en\/lockergoga-crushed-by-gorille\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cyber-detect.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"LOCKERGOGA crushed by GORILLE\u00a9 \\u0003\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#website\",\"url\":\"https:\/\/cyber-detect.com\/en\/\",\"name\":\"Cyber-Detect\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyber-detect.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#organization\",\"name\":\"Cyber-Detect\",\"url\":\"https:\/\/cyber-detect.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/AI-CYBER-DETECT-MORPHOLOGICAL-ANALYSIS-PAYSAGE-RGB-white-vecto.svg\",\"contentUrl\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/AI-CYBER-DETECT-MORPHOLOGICAL-ANALYSIS-PAYSAGE-RGB-white-vecto.svg\",\"width\":728,\"height\":242,\"caption\":\"Cyber-Detect\"},\"image\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#\/schema\/person\/9bc85be73e00a52bbc3294f538e0ae47\",\"name\":\"adminbilliotte\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e8ef84d61786269a92f9010e4333520a29594c88cc4f2c10f2805d592432d683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e8ef84d61786269a92f9010e4333520a29594c88cc4f2c10f2805d592432d683?s=96&d=mm&r=g\",\"caption\":\"adminbilliotte\"},\"url\":\"https:\/\/cyber-detect.com\/en\/author\/adminbilliotte\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LOCKERGOGA crushed by GORILLE\u00a9 \u0003 - Cyber-Detect","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyber-detect.com\/en\/lockergoga-crushed-by-gorille\/","og_locale":"en_US","og_type":"article","og_title":"LOCKERGOGA crushed by GORILLE\u00a9 \u0003 - Cyber-Detect","og_description":"The recent LockerGoga attacks against Altran in France [1] and Norsk Hydro in Norway [2] illustrate the need for advanced anti-malware defenses.","og_url":"https:\/\/cyber-detect.com\/en\/lockergoga-crushed-by-gorille\/","og_site_name":"Cyber-Detect","article_published_time":"2022-02-28T09:00:17+00:00","article_modified_time":"2022-02-28T09:00:18+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/shahadat-rahman-BfrQnKBulYQ-unsplash-scaled.jpg","type":"image\/jpeg"}],"author":"adminbilliotte","twitter_card":"summary_large_image","twitter_misc":{"Written by":"adminbilliotte","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cyber-detect.com\/en\/lockergoga-crushed-by-gorille\/#article","isPartOf":{"@id":"https:\/\/cyber-detect.com\/en\/lockergoga-crushed-by-gorille\/"},"author":{"name":"adminbilliotte","@id":"https:\/\/cyber-detect.com\/en\/#\/schema\/person\/9bc85be73e00a52bbc3294f538e0ae47"},"headline":"LOCKERGOGA crushed by GORILLE\u00a9 \u0003","datePublished":"2022-02-28T09:00:17+00:00","dateModified":"2022-02-28T09:00:18+00:00","mainEntityOfPage":{"@id":"https:\/\/cyber-detect.com\/en\/lockergoga-crushed-by-gorille\/"},"wordCount":553,"publisher":{"@id":"https:\/\/cyber-detect.com\/en\/#organization"},"image":{"@id":"https:\/\/cyber-detect.com\/en\/lockergoga-crushed-by-gorille\/#primaryimage"},"thumbnailUrl":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/shahadat-rahman-BfrQnKBulYQ-unsplash-scaled.jpg","articleSection":["Actualit\u00e9s"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cyber-detect.com\/en\/lockergoga-crushed-by-gorille\/","url":"https:\/\/cyber-detect.com\/en\/lockergoga-crushed-by-gorille\/","name":"LOCKERGOGA crushed by GORILLE\u00a9 \u0003 - Cyber-Detect","isPartOf":{"@id":"https:\/\/cyber-detect.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyber-detect.com\/en\/lockergoga-crushed-by-gorille\/#primaryimage"},"image":{"@id":"https:\/\/cyber-detect.com\/en\/lockergoga-crushed-by-gorille\/#primaryimage"},"thumbnailUrl":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/shahadat-rahman-BfrQnKBulYQ-unsplash-scaled.jpg","datePublished":"2022-02-28T09:00:17+00:00","dateModified":"2022-02-28T09:00:18+00:00","breadcrumb":{"@id":"https:\/\/cyber-detect.com\/en\/lockergoga-crushed-by-gorille\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyber-detect.com\/en\/lockergoga-crushed-by-gorille\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyber-detect.com\/en\/lockergoga-crushed-by-gorille\/#primaryimage","url":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/shahadat-rahman-BfrQnKBulYQ-unsplash-scaled.jpg","contentUrl":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/shahadat-rahman-BfrQnKBulYQ-unsplash-scaled.jpg","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/cyber-detect.com\/en\/lockergoga-crushed-by-gorille\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyber-detect.com\/en\/"},{"@type":"ListItem","position":2,"name":"LOCKERGOGA crushed by GORILLE\u00a9 \u0003"}]},{"@type":"WebSite","@id":"https:\/\/cyber-detect.com\/en\/#website","url":"https:\/\/cyber-detect.com\/en\/","name":"Cyber-Detect","description":"","publisher":{"@id":"https:\/\/cyber-detect.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyber-detect.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyber-detect.com\/en\/#organization","name":"Cyber-Detect","url":"https:\/\/cyber-detect.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyber-detect.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/AI-CYBER-DETECT-MORPHOLOGICAL-ANALYSIS-PAYSAGE-RGB-white-vecto.svg","contentUrl":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/AI-CYBER-DETECT-MORPHOLOGICAL-ANALYSIS-PAYSAGE-RGB-white-vecto.svg","width":728,"height":242,"caption":"Cyber-Detect"},"image":{"@id":"https:\/\/cyber-detect.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cyber-detect.com\/en\/#\/schema\/person\/9bc85be73e00a52bbc3294f538e0ae47","name":"adminbilliotte","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyber-detect.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e8ef84d61786269a92f9010e4333520a29594c88cc4f2c10f2805d592432d683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e8ef84d61786269a92f9010e4333520a29594c88cc4f2c10f2805d592432d683?s=96&d=mm&r=g","caption":"adminbilliotte"},"url":"https:\/\/cyber-detect.com\/en\/author\/adminbilliotte\/"}]}},"_links":{"self":[{"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/posts\/1415","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/comments?post=1415"}],"version-history":[{"count":2,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/posts\/1415\/revisions"}],"predecessor-version":[{"id":1419,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/posts\/1415\/revisions\/1419"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/media\/33"}],"wp:attachment":[{"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/media?parent=1415"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/categories?post=1415"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/tags?post=1415"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}