{"id":26524,"date":"2022-04-19T15:56:00","date_gmt":"2022-04-19T13:56:00","guid":{"rendered":"https:\/\/perseus.de\/ransomware-a-double-extorsion\/"},"modified":"2026-03-30T09:53:40","modified_gmt":"2026-03-30T07:53:40","slug":"ransomware-a-double-extorsion","status":"publish","type":"post","link":"https:\/\/perseus.de\/fr\/ransomware-a-double-extorsion\/","title":{"rendered":"Ransomware \u00e0 double extorsion"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"26524\" class=\"elementor elementor-26524 elementor-22223\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cab3f18 e-flex e-con-boxed e-con e-parent\" data-id=\"cab3f18\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2a02b8b e-con-full e-flex e-con e-child\" data-id=\"2a02b8b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f80ded elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"4f80ded\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Ransomware \u00e0 double extorsion\n<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d061a7 elementor-widget elementor-widget-image\" data-id=\"2d061a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png\" class=\"attachment-medium size-medium wp-image-25818\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-150x150.png 150w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-768x768.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5f71efbf e-flex e-con-boxed e-con e-parent\" data-id=\"5f71efbf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6c91c3b4 e-con-full e-flex e-con e-child\" data-id=\"6c91c3b4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e839854 elementor-widget elementor-widget-text-editor\" data-id=\"e839854\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<header class=\"Single__header Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size6D\"><div class=\"Share\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><p>Double extorsion se traduit par \u00ab double extorsion \u00bb. Cela n\u2019implique pas n\u00e9cessairement plusieurs chantages, mais les cybercriminels utilisent plusieurs moyens de pression pour leur chantage. <\/p><p>Avec les ransomwares qui \u00e9taient courants jusqu\u2019\u00e0 pr\u00e9sent, il existe g\u00e9n\u00e9ralement un moyen d\u2019exercer une pression : les donn\u00e9es d\u2019un ordinateur, d\u2019un r\u00e9seau ou d\u2019un syst\u00e8me sont chiffr\u00e9es. Une ran\u00e7on est exig\u00e9e pour le d\u00e9chiffrement. <\/p><p>Dans le cas du ransomware Double Extortion, les cybercriminels ajoutent un levier suppl\u00e9mentaire pour rendre le paiement de la ran\u00e7on aussi in\u00e9vitable que possible pour l\u2019entreprise victime de chantage.<\/p><h4> <\/h4><h4>Que signifie Double Extorsion en d\u00e9tail ?<\/h4><p><span style=\"font-size: 1rem;\">Avec le ransomware \u00e0 double extorsion, les cybercriminels peuvent utiliser diff\u00e9rents moyens de pression :<\/span><\/p><p><span style=\"font-size: 1rem;\"> <\/span><\/p><ul><li>Donn\u00e9es sensibles telles que des informations personnelles ou des secrets d\u2019entreprise. Les cybercriminels copient ces donn\u00e9es avant de chiffrer le syst\u00e8me. Si la ran\u00e7on ne se mat\u00e9rialise pas, ils menacent alors de publier ces donn\u00e9es ou de les mettre aux ench\u00e8res sur le darknet.  <\/li><li>Les attaques DDoS utilis\u00e9es par les cybercriminels pour rendre le site web de l\u2019entreprise chant\u00e9e inutilisable.<\/li><li>Les violations des r\u00e8glements par l\u2019entreprise d\u00e9tect\u00e9es par les cybercriminels, telles que le RGPD. Ensuite, les demandes de ran\u00e7on sont souvent inf\u00e9rieures \u00e0 l\u2019amende attendue. <\/li><\/ul><h3> <\/h3><h4>O\u00f9 puis-je rencontrer un ransomware \u00e0 double extorsion dans la vie quotidienne ?<\/h4><p>Qu\u2019il s\u2019agisse de ransomwares ou de ransomware \u00e0 double extorsion, les cybercriminels tentent souvent de placer le malware correspondant via des emails de phishing. Donc, si vous reconnaissez un tel e-mail, il se peut que vous veniez de repousser une attaque de ransomware par double extorsion. <\/p><p>Cependant, m\u00eame sans aucune action de votre part, vous pouvez toujours \u00eatre touch\u00e9 par un ransomware \u00e0 double extorsion. Par exemple, la cyberattaque majeure contre Mediamarktsaturn en 2021 a \u00e9t\u00e9 men\u00e9e par des cybercriminels connus pour le ransomware \u00e0 double extorsion. Dans de tels cas, les donn\u00e9es des clients de l\u2019entreprise concern\u00e9e peuvent \u00eatre publi\u00e9es. Cependant, \u00e0 notre connaissance, ce n\u2019\u00e9tait pas le cas apr\u00e8s la cyberattaque mentionn\u00e9e plus haut.   <\/p><h4> <\/h4><h4>Que puis-je faire pour am\u00e9liorer ma s\u00e9curit\u00e9 ?<\/h4><p>Les cybercriminels utilisent diff\u00e9rents vecteurs d\u2019attaque pour le ransomware Double Extortion. Cela inclut les emails de phishing, les attaques par force brute sur l\u2019acc\u00e8s \u00e0 distance au r\u00e9seau d\u2019entreprise, et les identifiants achet\u00e9s sur le dark web vers des r\u00e9seaux d\u00e9j\u00e0 compromis. Beaucoup, mais pas toutes, de ces attaques peuvent \u00eatre \u00e9vit\u00e9es.  <\/p><p>Nous recommandons donc une strat\u00e9gie de protection \u00e0 deux volets : d\u2019une part, contrer les attaques r\u00e9ussies (pr\u00e9vention) et, de l\u2019autre, limiter les d\u00e9g\u00e2ts en cas d\u2019attaques r\u00e9ussies (r\u00e9ponse).<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/header>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb1ddf2 e-flex e-con-boxed e-con e-parent\" data-id=\"cb1ddf2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6508b4e elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"6508b4e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Ransomware \u00e0 double extorsion Double extorsion se traduit par \u00ab double extorsion \u00bb. Cela n\u2019implique pas n\u00e9cessairement plusieurs chantages, mais les cybercriminels utilisent plusieurs moyens de pression pour leur chantage. Avec les ransomwares qui \u00e9taient courants jusqu\u2019\u00e0 pr\u00e9sent, il existe g\u00e9n\u00e9ralement un moyen d\u2019exercer une pression : les donn\u00e9es d\u2019un ordinateur, d\u2019un r\u00e9seau ou d\u2019un [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[58],"tags":[],"class_list":["post-26524","post","type-post","status-publish","format-standard","hentry","category-cyberlexique"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ransomware \u00e0 double extorsion - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/fr\/ransomware-a-double-extorsion\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware \u00e0 double extorsion - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Ransomware \u00e0 double extorsion Double extorsion se traduit par \u00ab double extorsion \u00bb. Cela n\u2019implique pas n\u00e9cessairement plusieurs chantages, mais les cybercriminels utilisent plusieurs moyens de pression pour leur chantage. Avec les ransomwares qui \u00e9taient courants jusqu\u2019\u00e0 pr\u00e9sent, il existe g\u00e9n\u00e9ralement un moyen d\u2019exercer une pression : les donn\u00e9es d\u2019un ordinateur, d\u2019un r\u00e9seau ou d\u2019un [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/fr\/ransomware-a-double-extorsion\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-19T13:56:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T07:53:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/ransomware-a-double-extorsion\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/ransomware-a-double-extorsion\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Ransomware \u00e0 double extorsion\",\"datePublished\":\"2022-04-19T13:56:00+00:00\",\"dateModified\":\"2026-03-30T07:53:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/ransomware-a-double-extorsion\\\/\"},\"wordCount\":476,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/ransomware-a-double-extorsion\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"articleSection\":[\"Cyberlexique\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/ransomware-a-double-extorsion\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/ransomware-a-double-extorsion\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/ransomware-a-double-extorsion\\\/\",\"name\":\"Ransomware \u00e0 double extorsion - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/ransomware-a-double-extorsion\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/ransomware-a-double-extorsion\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"datePublished\":\"2022-04-19T13:56:00+00:00\",\"dateModified\":\"2026-03-30T07:53:40+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/ransomware-a-double-extorsion\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/ransomware-a-double-extorsion\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/ransomware-a-double-extorsion\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/ransomware-a-double-extorsion\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware \u00e0 double extorsion\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware \u00e0 double extorsion - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/fr\/ransomware-a-double-extorsion\/","og_locale":"fr_FR","og_type":"article","og_title":"Ransomware \u00e0 double extorsion - Perseus Technologies","og_description":"Ransomware \u00e0 double extorsion Double extorsion se traduit par \u00ab double extorsion \u00bb. Cela n\u2019implique pas n\u00e9cessairement plusieurs chantages, mais les cybercriminels utilisent plusieurs moyens de pression pour leur chantage. Avec les ransomwares qui \u00e9taient courants jusqu\u2019\u00e0 pr\u00e9sent, il existe g\u00e9n\u00e9ralement un moyen d\u2019exercer une pression : les donn\u00e9es d\u2019un ordinateur, d\u2019un r\u00e9seau ou d\u2019un [&hellip;]","og_url":"https:\/\/perseus.de\/fr\/ransomware-a-double-extorsion\/","og_site_name":"Perseus Technologies","article_published_time":"2022-04-19T13:56:00+00:00","article_modified_time":"2026-03-30T07:53:40+00:00","og_image":[{"width":800,"height":800,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Xenia Silbe","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/fr\/ransomware-a-double-extorsion\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/fr\/ransomware-a-double-extorsion\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Ransomware \u00e0 double extorsion","datePublished":"2022-04-19T13:56:00+00:00","dateModified":"2026-03-30T07:53:40+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/fr\/ransomware-a-double-extorsion\/"},"wordCount":476,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/fr\/ransomware-a-double-extorsion\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","articleSection":["Cyberlexique"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/fr\/ransomware-a-double-extorsion\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/fr\/ransomware-a-double-extorsion\/","url":"https:\/\/perseus.de\/fr\/ransomware-a-double-extorsion\/","name":"Ransomware \u00e0 double extorsion - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/fr\/ransomware-a-double-extorsion\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/fr\/ransomware-a-double-extorsion\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","datePublished":"2022-04-19T13:56:00+00:00","dateModified":"2026-03-30T07:53:40+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/fr\/ransomware-a-double-extorsion\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/fr\/ransomware-a-double-extorsion\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/fr\/ransomware-a-double-extorsion\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/fr\/ransomware-a-double-extorsion\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Ransomware \u00e0 double extorsion"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/fr\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26524","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/comments?post=26524"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26524\/revisions"}],"predecessor-version":[{"id":26525,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26524\/revisions\/26525"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media?parent=26524"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/categories?post=26524"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/tags?post=26524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}