{"id":25996,"date":"2023-04-14T15:26:00","date_gmt":"2023-04-14T13:26:00","guid":{"rendered":"https:\/\/perseus.de\/compromission-de-mails-professionnels-compromission-de-mails-professionnels\/"},"modified":"2026-03-27T11:37:37","modified_gmt":"2026-03-27T10:37:37","slug":"compromission-de-mails-professionnels-compromission-de-mails-professionnels","status":"publish","type":"post","link":"https:\/\/perseus.de\/fr\/compromission-de-mails-professionnels-compromission-de-mails-professionnels\/","title":{"rendered":"Compromission d&rsquo;e-mails professionnels \/ Compromission d&rsquo;e-mails professionnels"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"25996\" class=\"elementor elementor-25996 elementor-22158\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cab3f18 e-flex e-con-boxed e-con e-parent\" data-id=\"cab3f18\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2a02b8b e-con-full e-flex e-con e-child\" data-id=\"2a02b8b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-183dd17 e-con-full e-flex e-con e-child\" data-id=\"183dd17\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f80ded elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"4f80ded\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Compromission d'e-mails professionnels \/ Compromission d'e-mails professionnels\n<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0816469 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"0816469\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img decoding=\"async\" class=\"wp-image-23715 alignleft\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/06\/English-Language.png\" alt=\"\" width=\"35\" height=\"35\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/06\/English-Language.png 250w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/06\/English-Language-150x150.png 150w\" sizes=\"(max-width: 35px) 100vw, 35px\" \/>Compromis de messagerie professionnelle (BEC)<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d061a7 elementor-widget elementor-widget-image\" data-id=\"2d061a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png\" class=\"attachment-medium size-medium wp-image-25818\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-150x150.png 150w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-768x768.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a92f7fc e-flex e-con-boxed e-con e-parent\" data-id=\"a92f7fc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2863ab6 e-con-full e-flex e-con e-child\" data-id=\"2863ab6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-193729d e-con-full e-flex e-con e-child\" data-id=\"193729d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7f4ead7 elementor-widget elementor-widget-text-editor\" data-id=\"7f4ead7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<header class=\"Single__header Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size6D\"><div class=\"Share\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><p>On parle de compromission de la messagerie \u00e9lectronique professionnelle (Business-E-Mail-Compromise ou BEC) lorsque la messagerie \u00e9lectronique est infiltr\u00e9e, compromise ou manipul\u00e9e.<\/p><p>Le fait qu&rsquo;une personne se fasse passer pour une personne de l&rsquo;entreprise dans le but d&rsquo;inciter le destinataire \u00e0 partager des informations confidentielles, \u00e0 effectuer des transactions financi\u00e8res ou \u00e0 r\u00e9aliser d&rsquo;autres actions qui compromettent durablement la s\u00e9curit\u00e9 de l&rsquo;entreprise fait \u00e9galement partie du BEC.<\/p><h4> <\/h4><h4><strong>Comment les cybercriminels proc\u00e8dent-ils ?  <\/strong><\/h4><p>Les cybercriminels utilisent diff\u00e9rentes m\u00e9thodes pour mener \u00e0 bien des attaques de compromissions d&rsquo;e-mails professionnels. D&rsquo;une part, des tactiques d&rsquo;ing\u00e9nierie sociale sont utilis\u00e9es pour pouvoir ex\u00e9cuter la fraude et d&rsquo;autre part, des compromissions concr\u00e8tes et r\u00e9elles de comptes de messagerie et de syst\u00e8mes peuvent \u00eatre effectu\u00e9es. <\/p><h6><strong>1. fraude \u00e0 l&rsquo;ing\u00e9nierie sociale<\/strong><\/h6><p>Dans les cas o\u00f9 les attaquants incitent leurs victimes \u00e0 effectuer certaines actions par le biais d&rsquo;une ing\u00e9nierie sociale cibl\u00e9e, l&rsquo;acteur de la menace n&rsquo;a pas r\u00e9ellement acc\u00e8s aux syst\u00e8mes internes. Les personnes concern\u00e9es sont contact\u00e9es \u00e0 partir d&rsquo;adresses \u00e9lectroniques externes. Afin d&rsquo;augmenter les chances de succ\u00e8s de l&rsquo;attaque, les pirates criminels investissent du temps et des efforts pour rendre leurs attaques trompeuses aussi r\u00e9alistes que possible.  <\/p><p>Ils tentent ainsi de d\u00e9couvrir comment l&rsquo;entreprise est structur\u00e9e et organis\u00e9e, qui sont les personnes concern\u00e9es et quelles sont les comp\u00e9tences et les responsabilit\u00e9s qui pr\u00e9valent. Une fois les informations collect\u00e9es, les criminels r\u00e9digent des e-mails au nom d&rsquo;un employ\u00e9, du PDG, d&rsquo;un prestataire de services ou d&rsquo;un partenaire commercial et contactent leurs cibles. Afin de mieux tromper les victimes potentielles, les adresses \u00e9lectroniques r\u00e9elles sont imit\u00e9es ou modifi\u00e9es de mani\u00e8re minime, de sorte que les personnes concern\u00e9es ne puissent pas facilement reconna\u00eetre la fraude. Un exemple typique serait ici la fraude au PDG.   <\/p><h6><strong>2. compromission de comptes ou de syst\u00e8mes de messagerie \u00e9lectronique<\/strong><\/h6><p>Alors que dans le cas ci-dessus, l&rsquo;attaquant pr\u00e9tend seulement faire partie de l&rsquo;organisation, dans le deuxi\u00e8me type d&rsquo;attaque BEC, il dispose d&rsquo;un acc\u00e8s r\u00e9el au serveur de messagerie ou au compte de messagerie de la victime ou de la personne qu&rsquo;il pr\u00e9tend \u00eatre. Cela signifie que l&rsquo;attaquant a acc\u00e8s au compte de messagerie r\u00e9ellement existant et qu&rsquo;il est capable, par exemple, d&rsquo;envoyer des e-mails \u00e0 partir de l&rsquo;adresse e-mail compromise ou d&rsquo;en prendre connaissance gr\u00e2ce \u00e0 des r\u00e8gles de transfert. <\/p><p>Il est \u00e9galement possible pour le pirate criminel d&rsquo;intercepter et de manipuler les e-mails. Les pirates criminels acc\u00e8dent aux comptes de messagerie ou aux syst\u00e8mes par des attaques de phishing, l&rsquo;utilisation de logiciels malveillants ou des failles de s\u00e9curit\u00e9 dans les applications, entre autres. <\/p><blockquote><p><strong>Un cas pratique pour illustrer le propos :  <\/strong><\/p><p>De nouvelles fen\u00eatres ont \u00e9t\u00e9 install\u00e9es dans une entreprise. Une fois les travaux termin\u00e9s, la facture finale a \u00e9t\u00e9 envoy\u00e9e \u00e0 l&rsquo;entreprise. Le service comptable a r\u00e9pondu \u00e0 la demande et a pay\u00e9 le montant d\u00fb. Quelque temps plus tard, l&rsquo;entreprise a \u00e9t\u00e9 contact\u00e9e par l&rsquo;installateur de fen\u00eatres, qui lui a indiqu\u00e9 que la facture \u00e9tait toujours en suspens.   <\/p><p>En clarifiant les faits, il s&rsquo;est av\u00e9r\u00e9 que la facture que l&rsquo;entreprise avait re\u00e7ue avait \u00e9t\u00e9 manipul\u00e9e et que les informations de paiement avaient \u00e9t\u00e9 modifi\u00e9es. Soup\u00e7onnant une cyber-attaque, les cyber-experts ont examin\u00e9 les syst\u00e8mes, les e-mails, les serveurs de messagerie et le PDF de la facture. Il s&rsquo;est av\u00e9r\u00e9 que le serveur de messagerie de l&rsquo;entreprise avait \u00e9t\u00e9 compromis, ce qui a permis \u00e0 l&rsquo;attaquant d&rsquo;intercepter et de manipuler l&rsquo;e-mail.  <\/p><\/blockquote><h4><strong> <\/strong><\/h4><h4><strong>Comment vous prot\u00e9gez-vous ?  <\/strong><\/h4><div><strong> <\/strong><\/div><h6><strong>En tant que collaborateur :<\/strong><\/h6><p>En ce qui concerne les mod\u00e8les d&rsquo;attaque mentionn\u00e9s ci-dessus :<\/p><ul><li>V\u00e9rifiez que l&rsquo;adresse \u00e9lectronique de l&rsquo;exp\u00e9diteur est bien celle de l&rsquo;e-mail en question ou qu&rsquo;elle ne contient pas d&rsquo;\u00e9l\u00e9ments inhabituels (lettres ou chiffres suppl\u00e9mentaires, nom de domaine incorrect, etc.<\/li><li>Faites attention au discours, aux formulations et aux expressions.<\/li><li>Gardez la t\u00eate froide m\u00eame dans les situations stressantes et ne vous laissez pas d\u00e9stabiliser.<\/li><li>Faites confiance \u00e0 votre instinct. Si quelque chose vous semble \u00e9trange, il y a g\u00e9n\u00e9ralement quelque chose de vrai. <\/li><li>Demandez un deuxi\u00e8me avis ou assurez-vous une fois de trop plut\u00f4t qu&rsquo;une fois de pas assez.<\/li><\/ul><p>En ce qui concerne d&rsquo;autres mod\u00e8les d&rsquo;attaques, y compris les attaques de phishing :<\/p><ul><li>Traitez toujours les pi\u00e8ces jointes et les liens des e-mails avec m\u00e9fiance.<\/li><li>Ne cliquez pas sur des liens ou ne t\u00e9l\u00e9chargez pas de pi\u00e8ces jointes dans des e-mails qui ne vous semblent pas fiables.<\/li><li>Ne visitez que des sites Internet s\u00e9rieux.<\/li><li>Ne cliquez pas au hasard sur des pop-ups ou des banni\u00e8res publicitaires.<\/li><li>Ne t\u00e9l\u00e9chargez et n&rsquo;installez des programmes ou des applications logicielles qu&rsquo;\u00e0 partir de sources fiables.<\/li><\/ul><h6> <\/h6><h6><strong>En tant que directeur g\u00e9n\u00e9ral :<\/strong><\/h6><ul><li>Pour se prot\u00e9ger contre les cyber-attaques, telles que les attaques de phishing ou diverses attaques d&rsquo;ing\u00e9nierie sociale, les mesures de protection techniques telles qu&rsquo;un pare-feu actif et des filtres anti-spam ne suffisent pas. Vous devez vous concentrer sur vos collaborateurs et les impliquer. <\/li><li>Offrez \u00e0 vos employ\u00e9s une sensibilisation compl\u00e8te et durable \u00e0 la cybers\u00e9curit\u00e9.<\/li><li>Proposez r\u00e9guli\u00e8rement \u00e0 votre personnel des formations et des entra\u00eenements sur les mod\u00e8les ou les types d&rsquo;attaques actuels. Vous pouvez \u00e9galement faire appel \u00e0 des prestataires externes, comme Perseus, pour former les employ\u00e9s. <\/li><li>Promouvez une culture d&rsquo;entreprise dans laquelle les employ\u00e9s sont encourag\u00e9s \u00e0 poser des questions et \u00e0 demander un deuxi\u00e8me avis en cas de doute.<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/header>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c69378d e-flex e-con-boxed e-con e-parent\" data-id=\"c69378d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ce588f7 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"ce588f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Compromission d&rsquo;e-mails professionnels \/ Compromission d&rsquo;e-mails professionnels Compromis de messagerie professionnelle (BEC) On parle de compromission de la messagerie \u00e9lectronique professionnelle (Business-E-Mail-Compromise ou BEC) lorsque la messagerie \u00e9lectronique est infiltr\u00e9e, compromise ou manipul\u00e9e. Le fait qu&rsquo;une personne se fasse passer pour une personne de l&rsquo;entreprise dans le but d&rsquo;inciter le destinataire \u00e0 partager des informations [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[58],"tags":[],"class_list":["post-25996","post","type-post","status-publish","format-standard","hentry","category-cyberlexique"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Compromission d&#039;e-mails professionnels \/ Compromission d&#039;e-mails professionnels - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/fr\/compromission-de-mails-professionnels-compromission-de-mails-professionnels\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Compromission d&#039;e-mails professionnels \/ Compromission d&#039;e-mails professionnels - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Compromission d&rsquo;e-mails professionnels \/ Compromission d&rsquo;e-mails professionnels Compromis de messagerie professionnelle (BEC) On parle de compromission de la messagerie \u00e9lectronique professionnelle (Business-E-Mail-Compromise ou BEC) lorsque la messagerie \u00e9lectronique est infiltr\u00e9e, compromise ou manipul\u00e9e. Le fait qu&rsquo;une personne se fasse passer pour une personne de l&rsquo;entreprise dans le but d&rsquo;inciter le destinataire \u00e0 partager des informations [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/fr\/compromission-de-mails-professionnels-compromission-de-mails-professionnels\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-14T13:26:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-27T10:37:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/06\/English-Language.png\" \/>\n\t<meta property=\"og:image:width\" content=\"250\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/compromission-de-mails-professionnels-compromission-de-mails-professionnels\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/compromission-de-mails-professionnels-compromission-de-mails-professionnels\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Compromission d&rsquo;e-mails professionnels \\\/ Compromission d&rsquo;e-mails professionnels\",\"datePublished\":\"2023-04-14T13:26:00+00:00\",\"dateModified\":\"2026-03-27T10:37:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/compromission-de-mails-professionnels-compromission-de-mails-professionnels\\\/\"},\"wordCount\":1017,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/compromission-de-mails-professionnels-compromission-de-mails-professionnels\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/English-Language.png\",\"articleSection\":[\"Cyberlexique\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/compromission-de-mails-professionnels-compromission-de-mails-professionnels\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/compromission-de-mails-professionnels-compromission-de-mails-professionnels\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/compromission-de-mails-professionnels-compromission-de-mails-professionnels\\\/\",\"name\":\"Compromission d'e-mails professionnels \\\/ Compromission d'e-mails professionnels - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/compromission-de-mails-professionnels-compromission-de-mails-professionnels\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/compromission-de-mails-professionnels-compromission-de-mails-professionnels\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/English-Language.png\",\"datePublished\":\"2023-04-14T13:26:00+00:00\",\"dateModified\":\"2026-03-27T10:37:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/compromission-de-mails-professionnels-compromission-de-mails-professionnels\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/compromission-de-mails-professionnels-compromission-de-mails-professionnels\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/compromission-de-mails-professionnels-compromission-de-mails-professionnels\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/English-Language.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/English-Language.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/compromission-de-mails-professionnels-compromission-de-mails-professionnels\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Compromission d&rsquo;e-mails professionnels \\\/ Compromission d&rsquo;e-mails professionnels\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Compromission d'e-mails professionnels \/ Compromission d'e-mails professionnels - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/fr\/compromission-de-mails-professionnels-compromission-de-mails-professionnels\/","og_locale":"fr_FR","og_type":"article","og_title":"Compromission d'e-mails professionnels \/ Compromission d'e-mails professionnels - Perseus Technologies","og_description":"Compromission d&rsquo;e-mails professionnels \/ Compromission d&rsquo;e-mails professionnels Compromis de messagerie professionnelle (BEC) On parle de compromission de la messagerie \u00e9lectronique professionnelle (Business-E-Mail-Compromise ou BEC) lorsque la messagerie \u00e9lectronique est infiltr\u00e9e, compromise ou manipul\u00e9e. Le fait qu&rsquo;une personne se fasse passer pour une personne de l&rsquo;entreprise dans le but d&rsquo;inciter le destinataire \u00e0 partager des informations [&hellip;]","og_url":"https:\/\/perseus.de\/fr\/compromission-de-mails-professionnels-compromission-de-mails-professionnels\/","og_site_name":"Perseus Technologies","article_published_time":"2023-04-14T13:26:00+00:00","article_modified_time":"2026-03-27T10:37:37+00:00","og_image":[{"width":250,"height":250,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/06\/English-Language.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Xenia Silbe","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/fr\/compromission-de-mails-professionnels-compromission-de-mails-professionnels\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/fr\/compromission-de-mails-professionnels-compromission-de-mails-professionnels\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Compromission d&rsquo;e-mails professionnels \/ Compromission d&rsquo;e-mails professionnels","datePublished":"2023-04-14T13:26:00+00:00","dateModified":"2026-03-27T10:37:37+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/fr\/compromission-de-mails-professionnels-compromission-de-mails-professionnels\/"},"wordCount":1017,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/fr\/compromission-de-mails-professionnels-compromission-de-mails-professionnels\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/06\/English-Language.png","articleSection":["Cyberlexique"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/fr\/compromission-de-mails-professionnels-compromission-de-mails-professionnels\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/fr\/compromission-de-mails-professionnels-compromission-de-mails-professionnels\/","url":"https:\/\/perseus.de\/fr\/compromission-de-mails-professionnels-compromission-de-mails-professionnels\/","name":"Compromission d'e-mails professionnels \/ Compromission d'e-mails professionnels - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/fr\/compromission-de-mails-professionnels-compromission-de-mails-professionnels\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/fr\/compromission-de-mails-professionnels-compromission-de-mails-professionnels\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/06\/English-Language.png","datePublished":"2023-04-14T13:26:00+00:00","dateModified":"2026-03-27T10:37:37+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/fr\/compromission-de-mails-professionnels-compromission-de-mails-professionnels\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/fr\/compromission-de-mails-professionnels-compromission-de-mails-professionnels\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/fr\/compromission-de-mails-professionnels-compromission-de-mails-professionnels\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/06\/English-Language.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/06\/English-Language.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/fr\/compromission-de-mails-professionnels-compromission-de-mails-professionnels\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Compromission d&rsquo;e-mails professionnels \/ Compromission d&rsquo;e-mails professionnels"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/fr\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/25996","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/comments?post=25996"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/25996\/revisions"}],"predecessor-version":[{"id":25997,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/25996\/revisions\/25997"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media?parent=25996"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/categories?post=25996"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/tags?post=25996"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}