{"id":27631,"date":"2020-07-22T16:31:00","date_gmt":"2020-07-22T14:31:00","guid":{"rendered":"https:\/\/perseus.de\/twitterhacked-une-attaque-sans-precedent-de-cybercriminels-contre-ce-service-de-microblogging\/"},"modified":"2026-03-30T17:41:22","modified_gmt":"2026-03-30T15:41:22","slug":"twitterhacked-une-attaque-sans-precedent-de-cybercriminels-contre-ce-service-de-microblogging","status":"publish","type":"post","link":"https:\/\/perseus.de\/fr\/twitterhacked-une-attaque-sans-precedent-de-cybercriminels-contre-ce-service-de-microblogging\/","title":{"rendered":"#TwitterHacked \u2013 une attaque sans pr\u00e9c\u00e9dent de cybercriminels contre ce service de microblogging"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27631\" class=\"elementor elementor-27631 elementor-23214\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba0588 e-flex e-con-boxed e-con e-parent\" data-id=\"2ba0588\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6459d3d elementor-widget elementor-widget-image\" data-id=\"6459d3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"730\" height=\"412\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2020\/07\/Blog-Header-Twitter-Hack.jpg\" class=\"attachment-medium_large size-medium_large wp-image-27629\" alt=\"Ordinateur portable Twitter\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2020\/07\/Blog-Header-Twitter-Hack.jpg 730w, https:\/\/perseus.de\/wp-content\/uploads\/2020\/07\/Blog-Header-Twitter-Hack-300x169.jpg 300w\" sizes=\"(max-width: 730px) 100vw, 730px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source de l\u2019image : Youcel Moran via Unsplash<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3582b53d e-flex e-con-boxed e-con e-parent\" data-id=\"3582b53d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-882819f e-con-full e-flex e-con e-child\" data-id=\"882819f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-4424d2e e-con-full e-flex e-con e-child\" data-id=\"4424d2e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3fb1c9e elementor-widget elementor-widget-text-editor\" data-id=\"3fb1c9e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>22.07.2020<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f3b55f1 elementor-widget elementor-widget-heading\" data-id=\"f3b55f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">#TwitterHacked \u2013 une attaque sans pr\u00e9c\u00e9dent de cybercriminels contre ce service de microblogging<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f0ea747 elementor-widget elementor-widget-text-editor\" data-id=\"f0ea747\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybers\u00e9curit\u00e9 | Hacker | Cybercriminalit\u00e9<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ce28679 e-con-full e-flex e-con e-child\" data-id=\"ce28679\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c01e25f elementor-widget elementor-widget-text-editor\" data-id=\"c01e25f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>L\u2019un des noms est plus connu que l\u2019autre. La semaine derni\u00e8re, des hackers ont pirat\u00e9 des comptes v\u00e9rifi\u00e9s de nombreuses c\u00e9l\u00e9brit\u00e9s et ont tweet\u00e9 \u00e0 propos d\u2019affaires douteuses avec des cryptomonnaies via leurs profils Twitter. <\/strong><\/p><p>Parmi les victimes figuraient le rappeur am\u00e9ricain Kanye West, le PDG d\u2019Amazon Jeff Bezos, l\u2019ancien pr\u00e9sident am\u00e9ricain Barack Obama, le candidat \u00e0 la pr\u00e9sidence am\u00e9ricaine Joe Biden et les g\u00e9ants de la tech Bill Gates et Elon Musk.<\/p><p>La publication <a href=\"https:\/\/www.vice.com\/en\/article\/jgxd3d\/twitter-insider-access-panel-account-hacks-biden-uber-bezos\">am\u00e9ricaine Motherboard <\/a>suppose d\u00e9sormais que des hackers ont tromp\u00e9 des employ\u00e9s de Twitter pour vous donner le contr\u00f4le des comptes en question. M\u00eame s\u2019il s\u2019agit tr\u00e8s probablement d\u2019un \u00ab travail d\u2019initi\u00e9 \u00bb, la question reste la suivante : \u00e0 quel point les profils sur les r\u00e9seaux sociaux sont-ils r\u00e9ellement s\u00e9curis\u00e9s et comment pouvez-vous vous prot\u00e9ger au mieux contre un possible piratage ? <\/p><p>Si vous consultez le centre d\u2019aide sur Twitter, vous trouverez un post sur le sujet \u00ab Mon compte a \u00e9t\u00e9 pirat\u00e9 \u00bb apr\u00e8s une courte recherche. Non seulement des personnalit\u00e9s connues ou de grands comptes v\u00e9rifi\u00e9s sont attaqu\u00e9s par des hackers \u2013 chaque utilisateur peut devenir la cible de cybercriminels. Pour vous \u00e9viter les ennuis qui s\u2019ensuivent, les experts en cybers\u00e9curit\u00e9 de Perseus conseillent donc :  <\/p><p>\u00ab Utilisez des mots de passe complexes que vous ajustez aussi \u00e0 intervalles r\u00e9guliers. Il est \u00e9galement important d\u2019activer l\u2019authentification \u00e0 deux facteurs. Bien s\u00fbr, ce n\u2019est pas une panac\u00e9e contre les cyberattaques, mais cela constitue un bon outil de s\u00e9curit\u00e9 contre les acc\u00e8s ind\u00e9sirables. \u00bb<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d84bbc e-flex e-con-boxed e-con e-parent\" data-id=\"4d84bbc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-05a335d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"05a335d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Source de l\u2019image : Youcel Moran via Unsplash 22.07.2020 #TwitterHacked \u2013 une attaque sans pr\u00e9c\u00e9dent de cybercriminels contre ce service de microblogging Cybers\u00e9curit\u00e9 | Hacker | Cybercriminalit\u00e9 L\u2019un des noms est plus connu que l\u2019autre. La semaine derni\u00e8re, des hackers ont pirat\u00e9 des comptes v\u00e9rifi\u00e9s de nombreuses c\u00e9l\u00e9brit\u00e9s et ont tweet\u00e9 \u00e0 propos d\u2019affaires douteuses [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":27630,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[61],"tags":[],"class_list":["post-27631","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>#TwitterHacked \u2013 une attaque sans pr\u00e9c\u00e9dent de cybercriminels contre ce service de microblogging - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/fr\/twitterhacked-une-attaque-sans-precedent-de-cybercriminels-contre-ce-service-de-microblogging\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"#TwitterHacked \u2013 une attaque sans pr\u00e9c\u00e9dent de cybercriminels contre ce service de microblogging - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Source de l\u2019image : Youcel Moran via Unsplash 22.07.2020 #TwitterHacked \u2013 une attaque sans pr\u00e9c\u00e9dent de cybercriminels contre ce service de microblogging Cybers\u00e9curit\u00e9 | Hacker | Cybercriminalit\u00e9 L\u2019un des noms est plus connu que l\u2019autre. La semaine derni\u00e8re, des hackers ont pirat\u00e9 des comptes v\u00e9rifi\u00e9s de nombreuses c\u00e9l\u00e9brit\u00e9s et ont tweet\u00e9 \u00e0 propos d\u2019affaires douteuses [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/fr\/twitterhacked-une-attaque-sans-precedent-de-cybercriminels-contre-ce-service-de-microblogging\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-22T14:31:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T15:41:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Blog-Header-Wie-Hacker-Hacker-werden.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"412\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anastasia Pamoukis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anastasia Pamoukis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/twitterhacked-une-attaque-sans-precedent-de-cybercriminels-contre-ce-service-de-microblogging\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/twitterhacked-une-attaque-sans-precedent-de-cybercriminels-contre-ce-service-de-microblogging\\\/\"},\"author\":{\"name\":\"Anastasia Pamoukis\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/6c87a2feea6439d0ead16c8f0f07e40b\"},\"headline\":\"#TwitterHacked \u2013 une attaque sans pr\u00e9c\u00e9dent de cybercriminels contre ce service de microblogging\",\"datePublished\":\"2020-07-22T14:31:00+00:00\",\"dateModified\":\"2026-03-30T15:41:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/twitterhacked-une-attaque-sans-precedent-de-cybercriminels-contre-ce-service-de-microblogging\\\/\"},\"wordCount\":323,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/twitterhacked-une-attaque-sans-precedent-de-cybercriminels-contre-ce-service-de-microblogging\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Blog-Header-Wie-Hacker-Hacker-werden.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/twitterhacked-une-attaque-sans-precedent-de-cybercriminels-contre-ce-service-de-microblogging\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/twitterhacked-une-attaque-sans-precedent-de-cybercriminels-contre-ce-service-de-microblogging\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/twitterhacked-une-attaque-sans-precedent-de-cybercriminels-contre-ce-service-de-microblogging\\\/\",\"name\":\"#TwitterHacked \u2013 une attaque sans pr\u00e9c\u00e9dent de cybercriminels contre ce service de microblogging - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/twitterhacked-une-attaque-sans-precedent-de-cybercriminels-contre-ce-service-de-microblogging\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/twitterhacked-une-attaque-sans-precedent-de-cybercriminels-contre-ce-service-de-microblogging\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Blog-Header-Wie-Hacker-Hacker-werden.jpg\",\"datePublished\":\"2020-07-22T14:31:00+00:00\",\"dateModified\":\"2026-03-30T15:41:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/twitterhacked-une-attaque-sans-precedent-de-cybercriminels-contre-ce-service-de-microblogging\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/twitterhacked-une-attaque-sans-precedent-de-cybercriminels-contre-ce-service-de-microblogging\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/twitterhacked-une-attaque-sans-precedent-de-cybercriminels-contre-ce-service-de-microblogging\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Blog-Header-Wie-Hacker-Hacker-werden.jpg\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Blog-Header-Wie-Hacker-Hacker-werden.jpg\",\"width\":730,\"height\":412,\"caption\":\"Carte de cr\u00e9dit pour hackers\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/twitterhacked-une-attaque-sans-precedent-de-cybercriminels-contre-ce-service-de-microblogging\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"#TwitterHacked \u2013 une attaque sans pr\u00e9c\u00e9dent de cybercriminels contre ce service de microblogging\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/6c87a2feea6439d0ead16c8f0f07e40b\",\"name\":\"Anastasia Pamoukis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"caption\":\"Anastasia Pamoukis\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\"],\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/author\\\/anastasia-pamoukis\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"#TwitterHacked \u2013 une attaque sans pr\u00e9c\u00e9dent de cybercriminels contre ce service de microblogging - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/fr\/twitterhacked-une-attaque-sans-precedent-de-cybercriminels-contre-ce-service-de-microblogging\/","og_locale":"fr_FR","og_type":"article","og_title":"#TwitterHacked \u2013 une attaque sans pr\u00e9c\u00e9dent de cybercriminels contre ce service de microblogging - Perseus Technologies","og_description":"Source de l\u2019image : Youcel Moran via Unsplash 22.07.2020 #TwitterHacked \u2013 une attaque sans pr\u00e9c\u00e9dent de cybercriminels contre ce service de microblogging Cybers\u00e9curit\u00e9 | Hacker | Cybercriminalit\u00e9 L\u2019un des noms est plus connu que l\u2019autre. La semaine derni\u00e8re, des hackers ont pirat\u00e9 des comptes v\u00e9rifi\u00e9s de nombreuses c\u00e9l\u00e9brit\u00e9s et ont tweet\u00e9 \u00e0 propos d\u2019affaires douteuses [&hellip;]","og_url":"https:\/\/perseus.de\/fr\/twitterhacked-une-attaque-sans-precedent-de-cybercriminels-contre-ce-service-de-microblogging\/","og_site_name":"Perseus Technologies","article_published_time":"2020-07-22T14:31:00+00:00","article_modified_time":"2026-03-30T15:41:22+00:00","og_image":[{"width":730,"height":412,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Blog-Header-Wie-Hacker-Hacker-werden.jpg","type":"image\/jpeg"}],"author":"Anastasia Pamoukis","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Anastasia Pamoukis","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/fr\/twitterhacked-une-attaque-sans-precedent-de-cybercriminels-contre-ce-service-de-microblogging\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/fr\/twitterhacked-une-attaque-sans-precedent-de-cybercriminels-contre-ce-service-de-microblogging\/"},"author":{"name":"Anastasia Pamoukis","@id":"https:\/\/perseus.de\/#\/schema\/person\/6c87a2feea6439d0ead16c8f0f07e40b"},"headline":"#TwitterHacked \u2013 une attaque sans pr\u00e9c\u00e9dent de cybercriminels contre ce service de microblogging","datePublished":"2020-07-22T14:31:00+00:00","dateModified":"2026-03-30T15:41:22+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/fr\/twitterhacked-une-attaque-sans-precedent-de-cybercriminels-contre-ce-service-de-microblogging\/"},"wordCount":323,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/fr\/twitterhacked-une-attaque-sans-precedent-de-cybercriminels-contre-ce-service-de-microblogging\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Blog-Header-Wie-Hacker-Hacker-werden.jpg","articleSection":["Blog"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/fr\/twitterhacked-une-attaque-sans-precedent-de-cybercriminels-contre-ce-service-de-microblogging\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/fr\/twitterhacked-une-attaque-sans-precedent-de-cybercriminels-contre-ce-service-de-microblogging\/","url":"https:\/\/perseus.de\/fr\/twitterhacked-une-attaque-sans-precedent-de-cybercriminels-contre-ce-service-de-microblogging\/","name":"#TwitterHacked \u2013 une attaque sans pr\u00e9c\u00e9dent de cybercriminels contre ce service de microblogging - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/fr\/twitterhacked-une-attaque-sans-precedent-de-cybercriminels-contre-ce-service-de-microblogging\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/fr\/twitterhacked-une-attaque-sans-precedent-de-cybercriminels-contre-ce-service-de-microblogging\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Blog-Header-Wie-Hacker-Hacker-werden.jpg","datePublished":"2020-07-22T14:31:00+00:00","dateModified":"2026-03-30T15:41:22+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/fr\/twitterhacked-une-attaque-sans-precedent-de-cybercriminels-contre-ce-service-de-microblogging\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/fr\/twitterhacked-une-attaque-sans-precedent-de-cybercriminels-contre-ce-service-de-microblogging\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/fr\/twitterhacked-une-attaque-sans-precedent-de-cybercriminels-contre-ce-service-de-microblogging\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Blog-Header-Wie-Hacker-Hacker-werden.jpg","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Blog-Header-Wie-Hacker-Hacker-werden.jpg","width":730,"height":412,"caption":"Carte de cr\u00e9dit pour hackers"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/fr\/twitterhacked-une-attaque-sans-precedent-de-cybercriminels-contre-ce-service-de-microblogging\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"#TwitterHacked \u2013 une attaque sans pr\u00e9c\u00e9dent de cybercriminels contre ce service de microblogging"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/6c87a2feea6439d0ead16c8f0f07e40b","name":"Anastasia Pamoukis","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","caption":"Anastasia Pamoukis"},"sameAs":["https:\/\/perseus.de"],"url":"https:\/\/perseus.de\/fr\/author\/anastasia-pamoukis\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27631","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/comments?post=27631"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27631\/revisions"}],"predecessor-version":[{"id":27632,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27631\/revisions\/27632"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media\/27630"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media?parent=27631"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/categories?post=27631"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/tags?post=27631"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}