{"id":27235,"date":"2021-09-08T16:48:00","date_gmt":"2021-09-08T14:48:00","guid":{"rendered":"https:\/\/perseus.de\/smishing-vol-de-donnees-en-cas-de-message\/"},"modified":"2026-03-30T15:36:45","modified_gmt":"2026-03-30T13:36:45","slug":"smishing-vol-de-donnees-en-cas-de-message","status":"publish","type":"post","link":"https:\/\/perseus.de\/fr\/smishing-vol-de-donnees-en-cas-de-message\/","title":{"rendered":"Smishing : vol de donn\u00e9es en cas de message !"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27235\" class=\"elementor elementor-27235 elementor-3437\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba0588 e-flex e-con-boxed e-con e-parent\" data-id=\"2ba0588\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6459d3d elementor-widget elementor-widget-image\" data-id=\"6459d3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"512\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/woman-6920636_1280-768x512.jpg\" class=\"attachment-medium_large size-medium_large wp-image-27234\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/woman-6920636_1280-768x512.jpg 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/woman-6920636_1280-300x200.jpg 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/woman-6920636_1280-1024x682.jpg 1024w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/woman-6920636_1280.jpg 1280w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source de l\u2019image : Mahbub Hasan via Pixabay<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2669262e e-flex e-con-boxed e-con e-parent\" data-id=\"2669262e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-125e438 e-con-full e-flex e-con e-child\" data-id=\"125e438\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d30bd47 e-con-full e-flex e-con e-child\" data-id=\"d30bd47\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-067bc58 elementor-widget elementor-widget-text-editor\" data-id=\"067bc58\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>08.09.2021<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ca6e383 elementor-widget elementor-widget-heading\" data-id=\"ca6e383\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Smishing : vol de donn\u00e9es en cas de message !\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47ea8f1 elementor-widget elementor-widget-text-editor\" data-id=\"47ea8f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybers\u00e9curit\u00e9 | Vecteurs d\u2019attaque  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-38d7896 e-con-full e-flex e-con e-child\" data-id=\"38d7896\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a6c15fb elementor-widget elementor-widget-text-editor\" data-id=\"a6c15fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Les attaques de phishing deviennent de plus en plus cibl\u00e9es \u2013 et sophistiqu\u00e9es ! De plus en plus de criminels ciblent les utilisateurs mobiles en envoyant du contenu malveillant via SMS. De quoi il s\u2019agit et comment vous pouvez le mieux vous prot\u00e9ger contre cela \u2013 continuez simplement \u00e0 lire.  <\/strong><\/p><p>Avez-vous d\u00e9j\u00e0 re\u00e7u un de ces SMS disant qu\u2019un colis que vous auriez pr\u00e9tendument command\u00e9 ne pouvait pas \u00eatre livr\u00e9 et que vous devriez t\u00e9l\u00e9charger l\u2019application du fournisseur via le lien contenu dans le message pour finalement le recevoir ? Tu n\u2019avais rien command\u00e9&#8230; Si vous n\u2019avez pas suivi les instructions de ce message, vous avez tout fait correctement ! C\u2019est parce qu\u2019il s\u2019agit de ce qu\u2019on appelle du smishing, c\u2019est-\u00e0-dire du phishing via SMS. Et ce sc\u00e9nario n\u2019est qu\u2019un parmi tant d\u2019autres.   <\/p><p><strong> <\/strong><\/p><h4><strong>Le phishing repens\u00e9 et rendu mobile<\/strong><\/h4><p>Malgr\u00e9 les nombreux services de messagerie qui ont \u00e9merg\u00e9 comme des champignons ces derni\u00e8res ann\u00e9es, le SMS reste un type de conversation fr\u00e9quemment utilis\u00e9 sur le smartphone. Surtout en p\u00e9riode de t\u00e9l\u00e9travail et de t\u00e9l\u00e9travail, o\u00f9 des appareils priv\u00e9s sont utilis\u00e9s au quotidien, une grande partie de la communication se fait via des t\u00e9l\u00e9phones mobiles et est per\u00e7ue comme largement s\u00e9curis\u00e9e. C\u2019est pr\u00e9cis\u00e9ment cette hypoth\u00e8se dont les criminels profitent. L\u2019objectif des fraudeurs est d\u2019utiliser des SMS trompeurs pour acc\u00e9der \u00e0 des donn\u00e9es sensibles et \u00e0 des informations pr\u00e9cieuses.   <\/p><p>Actuellement, les attaques de smishing peuvent \u00eatre divis\u00e9es en trois cat\u00e9gories diff\u00e9rentes :<\/p><p> <\/p><p><strong> <\/strong><\/p><h4><strong>Distribution des logiciels malveillants<\/strong><\/h4><p>Le sc\u00e9nario d\u00e9crit ci-dessus est l\u2019un des nombreux et repose sur le classique phishing par email. Le lien dans le SMS m\u00e8ne \u00e0 un site web o\u00f9 une application est disponible en t\u00e9l\u00e9chargement. Cela ressemble \u00e9trangement \u00e0 ceux des fournisseurs de services de colis ou d\u2019autres prestataires de services \u2013 voir Factbox \u2013 mais c\u2019est un faux et contient un cheval de Troie bancaire. Elle est activ\u00e9e lors du t\u00e9l\u00e9chargement de l\u2019application suppos\u00e9e et peut acc\u00e9der ou utiliser toutes les donn\u00e9es personnelles, telles que les num\u00e9ros de t\u00e9l\u00e9phone, les adresses e-mail et les coordonn\u00e9es bancaires apr\u00e8s l\u2019installation. De plus, l\u2019acc\u00e8s peut ensuite envoyer d\u2019autres SMS malveillants aux contacts du t\u00e9l\u00e9phone mobile \u2013 une r\u00e9action en cha\u00eene aux cons\u00e9quences fatales.    <\/p><p>Les chevaux de Troie bancaires les plus r\u00e9pandus de ce type sont actuellement FluBot et TeaBot. Les appareils Android en particulier sont affect\u00e9s par ce sc\u00e9nario d\u2019attaque, car le syst\u00e8me d\u2019exploitation permet d\u2019installer des applications \u00e0 partir de sources inconnues. <\/p><p> <\/p><p><strong> <\/strong><\/p><h4><strong>Smishing bancaire<\/strong><\/h4><p>Les donn\u00e9es d\u2019acc\u00e8s pour la banque en ligne int\u00e9ressent particuli\u00e8rement les cybercriminels. La propagation de la peur est une m\u00e9thode particuli\u00e8rement populaire pour les hackers afin d\u2019acc\u00e9der aux d\u00e9p\u00f4ts d\u2019argent de leurs victimes : ils envoient des SMS depuis la banque suppos\u00e9e de la victime avec l\u2019information que le compte bancaire a \u00e9t\u00e9 pirat\u00e9 et fournissent un num\u00e9ro de t\u00e9l\u00e9phone ou un lien pour \u00e9viter d\u2019autres dommages pr\u00e9sum\u00e9s. Le num\u00e9ro de t\u00e9l\u00e9phone m\u00e8ne souvent directement aux criminels, le lien du message vers un faux site web. Dans les deux cas, les victimes doivent \u00eatre persuad\u00e9es de divulguer leurs donn\u00e9es d\u2019acc\u00e8s \u2013 pour ensuite d\u00e9couvrir un compte bancaire pill\u00e9. Souvent, le num\u00e9ro de l\u2019exp\u00e9diteur peut \u00eatre cach\u00e9, de sorte que de nombreuses victimes ne peuvent pas savoir de quelle source provient le message.    <\/p><p> <\/p><p><strong> <\/strong><\/p><h4><strong>Le tour du petit-enfant en SMS<\/strong><\/h4><p>Ce type de smishing touche principalement les personnes moins \u00e0 l\u2019aise avec la technologie. Dans ce cas, les escrocs pr\u00e9tendent \u00eatre des connaissances de la victime \u2013 les noms sont souvent appris via les r\u00e9seaux sociaux \u2013 et promettent un avantage financier si vous effectuez un d\u00e9p\u00f4t \u00e0 l\u2019avance sur un certain compte bancaire. <\/p><p> <\/p><p><strong> <\/strong><\/p><h4><strong>Comment vous pouvez le mieux prot\u00e9ger vous-m\u00eame et les autres contre les smishings<\/strong><\/h4><ol><li>Ne cliquez sur aucun des liens et bloquez le num\u00e9ro de t\u00e9l\u00e9phone de l\u2019exp\u00e9diteur. Si vous attendez r\u00e9ellement un envoi et que vous n\u2019\u00eates pas s\u00fbr que le SMS de votre livreur de colis fonctionnera, contactez-le directement. Il en va de m\u00eame pour votre compte bancaire : connectez-vous directement via le navigateur pour obtenir plus d\u2019informations.  <\/li><li>Utilisez uniquement des applications provenant de sources fiables, c\u2019est-\u00e0-dire des boutiques officielles ou du site web du fournisseur, pour t\u00e9l\u00e9charger des applications.<\/li><li>Sur Android, il y a l\u2019option de d\u00e9sactiver l\u2019\u00e9l\u00e9ment de menu \u00ab Installer des applications \u00e0 partir de sources inconnues \u00bb dans les param\u00e8tres. C\u2019est ainsi que vous vous prot\u00e9gez \u2013 ainsi que les autres. <\/li><li>Signalez l\u2019incident de smishing au centre de conseils aux consommateurs. Cela vous prot\u00e9gera non seulement vous-m\u00eame, mais aussi les autres.<br>Si un tel incident se produit sur votre t\u00e9l\u00e9phone professionnel, informez-en les membres de votre organisation. <\/li><li>Sensibilisez-vous \u00e0 ce type d&rsquo;attaques : posez-vous la question de savoir si votre banque ou votre soci\u00e9t\u00e9 de livraison de colis vous enverrait de tels messages. Auraient-ils m\u00eame votre num\u00e9ro de t\u00e9l\u00e9phone portable pour le faire ? Aucune banque n&rsquo;appelle ses clients pour leur demander des informations personnelles par t\u00e9l\u00e9phone. Si vous recevez un appel de ce type, interrompez imm\u00e9diatement la conversation.   <\/li><li>Faites attention aux liens cryptiques et \u00e0 l\u2019orthographe dans le texte principal. Au final, ce qui suit s\u2019applique toujours : mieux vaut pr\u00e9venir que gu\u00e9rir&#8230;. <\/li><\/ol><p><strong> <\/strong><\/p><h4><strong>D\u00e9j\u00e0 compris \u2013 comment g\u00e9rer les d\u00e9g\u00e2ts<\/strong><\/h4><ol><li>Si vous soup\u00e7onnez avoir \u00e9t\u00e9 victime d\u2019une attaque par smishing, mettez votre t\u00e9l\u00e9phone portable en mode avion. Cela emp\u00eache que les logiciels malveillants ne soient envoy\u00e9s \u00e0 vos contacts. <\/li><li>Informez votre op\u00e9rateur mobile de l\u2019incident \u2013 et votre banque si vous avez d\u00e9j\u00e0 divulgu\u00e9 vos informations bancaires.<\/li><li>R\u00e9initialisez votre smartphone aux param\u00e8tres d\u2019usine pour effacer les donn\u00e9es install\u00e9es et sauvegard\u00e9es.<\/li><\/ol><p> <\/p><p>Avez-vous d\u2019autres questions sur le phishing ou souhaitez-vous savoir comment vous pouvez aussi rendre votre entreprise cybers\u00e9curis\u00e9e ? Nos experts de Perseus Technologies prendront en charge vos pr\u00e9occupations et seront heureux de vous conseiller plus en d\u00e9tail. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d84bbc e-flex e-con-boxed e-con e-parent\" data-id=\"4d84bbc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-05a335d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"05a335d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Les attaques de phishing deviennent de plus en plus cibl\u00e9es \u2013 et sophistiqu\u00e9es ! De plus en plus de criminels ciblent les utilisateurs mobiles en envoyant du contenu malveillant via SMS. De quoi il s\u2019agit et comment vous pouvez le mieux vous prot\u00e9ger contre cela \u2013 continuez simplement \u00e0 lire.  <\/p>\n","protected":false},"author":3,"featured_media":27234,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[61],"tags":[],"class_list":["post-27235","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Smishing : vol de donn\u00e9es en cas de message ! - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/fr\/smishing-vol-de-donnees-en-cas-de-message\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Smishing : vol de donn\u00e9es en cas de message ! - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Les attaques de phishing deviennent de plus en plus cibl\u00e9es \u2013 et sophistiqu\u00e9es ! De plus en plus de criminels ciblent les utilisateurs mobiles en envoyant du contenu malveillant via SMS. De quoi il s\u2019agit et comment vous pouvez le mieux vous prot\u00e9ger contre cela \u2013 continuez simplement \u00e0 lire.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/fr\/smishing-vol-de-donnees-en-cas-de-message\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-08T14:48:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T13:36:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/woman-6920636_1280.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/smishing-vol-de-donnees-en-cas-de-message\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/smishing-vol-de-donnees-en-cas-de-message\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Smishing : vol de donn\u00e9es en cas de message !\",\"datePublished\":\"2021-09-08T14:48:00+00:00\",\"dateModified\":\"2026-03-30T13:36:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/smishing-vol-de-donnees-en-cas-de-message\\\/\"},\"wordCount\":1136,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/smishing-vol-de-donnees-en-cas-de-message\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/woman-6920636_1280.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/smishing-vol-de-donnees-en-cas-de-message\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/smishing-vol-de-donnees-en-cas-de-message\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/smishing-vol-de-donnees-en-cas-de-message\\\/\",\"name\":\"Smishing : vol de donn\u00e9es en cas de message ! - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/smishing-vol-de-donnees-en-cas-de-message\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/smishing-vol-de-donnees-en-cas-de-message\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/woman-6920636_1280.jpg\",\"datePublished\":\"2021-09-08T14:48:00+00:00\",\"dateModified\":\"2026-03-30T13:36:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/smishing-vol-de-donnees-en-cas-de-message\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/smishing-vol-de-donnees-en-cas-de-message\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/smishing-vol-de-donnees-en-cas-de-message\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/woman-6920636_1280.jpg\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/woman-6920636_1280.jpg\",\"width\":1280,\"height\":853},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/smishing-vol-de-donnees-en-cas-de-message\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Smishing : vol de donn\u00e9es en cas de message !\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Smishing : vol de donn\u00e9es en cas de message ! - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/fr\/smishing-vol-de-donnees-en-cas-de-message\/","og_locale":"fr_FR","og_type":"article","og_title":"Smishing : vol de donn\u00e9es en cas de message ! - Perseus Technologies","og_description":"Les attaques de phishing deviennent de plus en plus cibl\u00e9es \u2013 et sophistiqu\u00e9es ! De plus en plus de criminels ciblent les utilisateurs mobiles en envoyant du contenu malveillant via SMS. De quoi il s\u2019agit et comment vous pouvez le mieux vous prot\u00e9ger contre cela \u2013 continuez simplement \u00e0 lire.","og_url":"https:\/\/perseus.de\/fr\/smishing-vol-de-donnees-en-cas-de-message\/","og_site_name":"Perseus Technologies","article_published_time":"2021-09-08T14:48:00+00:00","article_modified_time":"2026-03-30T13:36:45+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/woman-6920636_1280.jpg","type":"image\/jpeg"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Xenia Silbe","Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/fr\/smishing-vol-de-donnees-en-cas-de-message\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/fr\/smishing-vol-de-donnees-en-cas-de-message\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Smishing : vol de donn\u00e9es en cas de message !","datePublished":"2021-09-08T14:48:00+00:00","dateModified":"2026-03-30T13:36:45+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/fr\/smishing-vol-de-donnees-en-cas-de-message\/"},"wordCount":1136,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/fr\/smishing-vol-de-donnees-en-cas-de-message\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/woman-6920636_1280.jpg","articleSection":["Blog"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/fr\/smishing-vol-de-donnees-en-cas-de-message\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/fr\/smishing-vol-de-donnees-en-cas-de-message\/","url":"https:\/\/perseus.de\/fr\/smishing-vol-de-donnees-en-cas-de-message\/","name":"Smishing : vol de donn\u00e9es en cas de message ! - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/fr\/smishing-vol-de-donnees-en-cas-de-message\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/fr\/smishing-vol-de-donnees-en-cas-de-message\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/woman-6920636_1280.jpg","datePublished":"2021-09-08T14:48:00+00:00","dateModified":"2026-03-30T13:36:45+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/fr\/smishing-vol-de-donnees-en-cas-de-message\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/fr\/smishing-vol-de-donnees-en-cas-de-message\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/fr\/smishing-vol-de-donnees-en-cas-de-message\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/woman-6920636_1280.jpg","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/woman-6920636_1280.jpg","width":1280,"height":853},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/fr\/smishing-vol-de-donnees-en-cas-de-message\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Smishing : vol de donn\u00e9es en cas de message !"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/fr\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27235","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/comments?post=27235"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27235\/revisions"}],"predecessor-version":[{"id":27236,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27235\/revisions\/27236"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media\/27234"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media?parent=27235"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/categories?post=27235"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/tags?post=27235"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}