{"id":27840,"date":"2022-04-26T09:52:00","date_gmt":"2022-04-26T07:52:00","guid":{"rendered":"https:\/\/perseus.de\/des-cybercriminels-infiltrent-le-reseau-dentreprise-de-t-mobile\/"},"modified":"2026-03-31T07:24:27","modified_gmt":"2026-03-31T05:24:27","slug":"des-cybercriminels-infiltrent-le-reseau-dentreprise-de-t-mobile","status":"publish","type":"post","link":"https:\/\/perseus.de\/fr\/des-cybercriminels-infiltrent-le-reseau-dentreprise-de-t-mobile\/","title":{"rendered":"Des cybercriminels infiltrent le r\u00e9seau d\u2019entreprise de T-Mobile"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27840\" class=\"elementor elementor-27840 elementor-2925\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dcf4ec4 e-flex e-con-boxed e-con e-parent\" data-id=\"dcf4ec4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e1db58c elementor-widget elementor-widget-image\" data-id=\"e1db58c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"200\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\" class=\"attachment-large size-large wp-image-27802\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png 1024w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-300x75.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-768x192.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025.png 1200w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1258a43 e-flex e-con-boxed e-con e-parent\" data-id=\"1258a43\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2de4e88 e-con-full e-flex e-con e-child\" data-id=\"2de4e88\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4982c80 elementor-widget elementor-widget-text-editor\" data-id=\"4982c80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>26.04.2022<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8348bc5 elementor-widget elementor-widget-heading\" data-id=\"8348bc5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vuln\u00e9rabilit\u00e9 critique dans Microsoft Exchange Server<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb03842 e-con-full e-flex e-con e-child\" data-id=\"eb03842\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-91d0988 elementor-widget elementor-widget-text-editor\" data-id=\"91d0988\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Une fois de plus, un incident cybern\u00e9tique a eu lieu chez le fournisseur de t\u00e9l\u00e9communications T-Mobile. Des hackers criminels ont r\u00e9ussi \u00e0 p\u00e9n\u00e9trer le r\u00e9seau de l\u2019entreprise gr\u00e2ce \u00e0 des identifiants vol\u00e9s et \u00e0 acc\u00e9der au logiciel d\u2019exploitation. <\/strong><\/p><p>Dans notre article de blog, vous d\u00e9couvrirez comment les \u00e9v\u00e9nements se sont produits et comment les entreprises peuvent se prot\u00e9ger.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f85a5ad e-flex e-con-boxed e-con e-parent\" data-id=\"f85a5ad\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-fad2031 e-con-full e-flex e-con e-child\" data-id=\"fad2031\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8282d30 elementor-widget elementor-widget-text-editor\" data-id=\"8282d30\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Que s\u2019est-il pass\u00e9 ?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ee744d2 e-con-full e-flex e-con e-child\" data-id=\"ee744d2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5ea6506 elementor-widget elementor-widget-text-editor\" data-id=\"5ea6506\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Le 22.04.2022, T-Mobile a confirm\u00e9 que le groupe de hackers criminels Lapsus$ avait <a href=\"https:\/\/california18.com\/another-lapsus-hack-confirmed-access-to-t-mobiles-internal-systems-2\/4329532022\/\">p\u00e9n\u00e9tr\u00e9 le r\u00e9seau de l\u2019entreprise<\/a> il y a quelques semaines avec des identifiants pr\u00e9c\u00e9demment vol\u00e9s et avait ainsi pu acc\u00e9der aux syst\u00e8mes internes de l\u2019entreprise. Lapsus$ est connu pour voler des donn\u00e9es aupr\u00e8s d\u2019entreprises r\u00e9put\u00e9es et faire des demandes de ran\u00e7on. Le <a href=\"https:\/\/www.theverge.com\/2022\/4\/23\/23038570\/lapsus-hackers-target-t-mobile-source-code-multiple-breaches-cybersecurity\">groupe serait<\/a> dirig\u00e9 par un cerveau adolescent et a d\u00e9j\u00e0 \u00e9t\u00e9 arr\u00eat\u00e9.  <\/p><p>Un porte-parole de la soci\u00e9t\u00e9 de t\u00e9l\u00e9communications a assur\u00e9 <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/t-mobile-confirms-lapsus-hackers-breached-internal-systems\/\">\u00e0 BleepingComputer<\/a> qu\u2019aucune information sensible ni donn\u00e9es clients n\u2019avait \u00e9t\u00e9 vol\u00e9e dans le cadre de la cyberattaque. Les cybercriminels n\u2019ont r\u00e9ussi \u00e0 acc\u00e9der qu\u2019\u00e0 des logiciels d\u2019exploitation internes, qui ne sont pas li\u00e9s \u00e0 des informations confidentielles. Aucune preuve n\u2019a \u00e9t\u00e9 trouv\u00e9e que des donn\u00e9es ou des secrets commerciaux aient \u00e9t\u00e9 intercept\u00e9s.  <\/p><p>L\u2019incident a \u00e9t\u00e9 d\u00e9couvert gr\u00e2ce \u00e0 des outils de surveillance internes qui ont document\u00e9 l\u2019intrusion des acteurs non autoris\u00e9s via des identifiants vol\u00e9s. Selon T-Mobile, l\u2019acc\u00e8s des criminels a \u00e9t\u00e9 rapidement coup\u00e9 et les identifiants compromis utilis\u00e9s ont \u00e9t\u00e9 imm\u00e9diatement d\u00e9sactiv\u00e9s. Les syst\u00e8mes et processus de l\u2019entreprise ont \u00e9t\u00e9 nettoy\u00e9s et fonctionnent comme pr\u00e9vu.  <\/p><p>L\u2019incident cybern\u00e9tique a \u00e9t\u00e9 mis en lumi\u00e8re par le journaliste d\u2019investigation ind\u00e9pendant Brian Krebs, qui a \u00e9t\u00e9 le premier \u00e0 en <a href=\"https:\/\/krebsonsecurity.com\/2022\/04\/leaked-chats-show-lapsus-stole-t-mobile-source-code\/\">faire un<\/a> reportage. Il a pu analyser les messages de discussion Telegram fuit\u00e9s entre membres du gang Lapsus$ et d\u00e9terminer que les assaillants avaient r\u00e9ussi \u00e0 voler le code source interne de T-Mobile puis \u00e0 p\u00e9n\u00e9trer les syst\u00e8mes. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ceb0f40 e-flex e-con-boxed e-con e-parent\" data-id=\"ceb0f40\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-71cb03a e-con-full e-flex e-con e-child\" data-id=\"71cb03a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-26d4389 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"26d4389\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-02dd0e9 e-flex e-con-boxed e-con e-parent\" data-id=\"02dd0e9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-16d621d e-con-full e-flex e-con e-child\" data-id=\"16d621d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-89904c7 elementor-widget elementor-widget-text-editor\" data-id=\"89904c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Quels sont les risques pour mon entreprise ?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fae461d e-con-full e-flex e-con e-child\" data-id=\"fae461d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0f04793 elementor-widget elementor-widget-text-editor\" data-id=\"0f04793\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Selon T-Mobile, le groupe de hackers criminels n\u2019avait acc\u00e8s qu\u2019\u00e0 des syst\u00e8mes internes, mais ceux-ci n\u2019\u00e9taient pas li\u00e9s \u00e0 des donn\u00e9es sensibles ni m\u00eame \u00e0 des donn\u00e9es clients. Les informations sensibles n\u2019\u00e9taient pas vol\u00e9es et ne pouvaient donc pas \u00eatre mises en vente sur le darknet. <\/p><p>Par cons\u00e9quent, on peut supposer qu\u2019il n\u2019y a pas de risque imm\u00e9diat pour les clients T-Mobile \u2013 n\u00e9anmoins, une vigilance est n\u00e9cessaire. Comme toujours : <\/p><ul><li>N\u2019utilisez jamais les m\u00eames mots de passe pour diff\u00e9rentes applications et g\u00e9rez vos donn\u00e9es avec soin. Un <a href=\"http:\/\/18.185.154.157\/2022\/04\/22\/passwort-manager\/\">gestionnaire de mots de passe<\/a> vous aide \u00e0 la g\u00e9rer. <\/li><li>Faites attention aux messages texte et <a href=\"http:\/\/18.185.154.157\/2022\/05\/19\/phishing-2\/\">e-mails<\/a> <a href=\"http:\/\/18.185.154.157\/2022\/04\/26\/smishing\/\">suspects<\/a>.<\/li><li>En aucun cas vous ne devez cliquer sur des liens dans ces messages et ne pas divulguer d\u2019informations confidentielles.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cdadbd8 e-flex e-con-boxed e-con e-parent\" data-id=\"cdadbd8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-104dd95 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"104dd95\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>26.04.2022 Vuln\u00e9rabilit\u00e9 critique dans Microsoft Exchange Server Une fois de plus, un incident cybern\u00e9tique a eu lieu chez le fournisseur de t\u00e9l\u00e9communications T-Mobile. Des hackers criminels ont r\u00e9ussi \u00e0 p\u00e9n\u00e9trer le r\u00e9seau de l\u2019entreprise gr\u00e2ce \u00e0 des identifiants vol\u00e9s et \u00e0 acc\u00e9der au logiciel d\u2019exploitation. Dans notre article de blog, vous d\u00e9couvrirez comment les \u00e9v\u00e9nements [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[65],"tags":[],"class_list":["post-27840","post","type-post","status-publish","format-standard","hentry","category-alerte-aux-dangers"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Des cybercriminels infiltrent le r\u00e9seau d\u2019entreprise de T-Mobile - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/fr\/des-cybercriminels-infiltrent-le-reseau-dentreprise-de-t-mobile\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Des cybercriminels infiltrent le r\u00e9seau d\u2019entreprise de T-Mobile - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"26.04.2022 Vuln\u00e9rabilit\u00e9 critique dans Microsoft Exchange Server Une fois de plus, un incident cybern\u00e9tique a eu lieu chez le fournisseur de t\u00e9l\u00e9communications T-Mobile. Des hackers criminels ont r\u00e9ussi \u00e0 p\u00e9n\u00e9trer le r\u00e9seau de l\u2019entreprise gr\u00e2ce \u00e0 des identifiants vol\u00e9s et \u00e0 acc\u00e9der au logiciel d\u2019exploitation. Dans notre article de blog, vous d\u00e9couvrirez comment les \u00e9v\u00e9nements [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/fr\/des-cybercriminels-infiltrent-le-reseau-dentreprise-de-t-mobile\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-26T07:52:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-31T05:24:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/des-cybercriminels-infiltrent-le-reseau-dentreprise-de-t-mobile\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/des-cybercriminels-infiltrent-le-reseau-dentreprise-de-t-mobile\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Des cybercriminels infiltrent le r\u00e9seau d\u2019entreprise de T-Mobile\",\"datePublished\":\"2022-04-26T07:52:00+00:00\",\"dateModified\":\"2026-03-31T05:24:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/des-cybercriminels-infiltrent-le-reseau-dentreprise-de-t-mobile\\\/\"},\"wordCount\":535,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/des-cybercriminels-infiltrent-le-reseau-dentreprise-de-t-mobile\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\",\"articleSection\":[\"Alerte aux dangers\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/des-cybercriminels-infiltrent-le-reseau-dentreprise-de-t-mobile\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/des-cybercriminels-infiltrent-le-reseau-dentreprise-de-t-mobile\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/des-cybercriminels-infiltrent-le-reseau-dentreprise-de-t-mobile\\\/\",\"name\":\"Des cybercriminels infiltrent le r\u00e9seau d\u2019entreprise de T-Mobile - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/des-cybercriminels-infiltrent-le-reseau-dentreprise-de-t-mobile\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/des-cybercriminels-infiltrent-le-reseau-dentreprise-de-t-mobile\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\",\"datePublished\":\"2022-04-26T07:52:00+00:00\",\"dateModified\":\"2026-03-31T05:24:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/des-cybercriminels-infiltrent-le-reseau-dentreprise-de-t-mobile\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/des-cybercriminels-infiltrent-le-reseau-dentreprise-de-t-mobile\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/des-cybercriminels-infiltrent-le-reseau-dentreprise-de-t-mobile\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/des-cybercriminels-infiltrent-le-reseau-dentreprise-de-t-mobile\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Des cybercriminels infiltrent le r\u00e9seau d\u2019entreprise de T-Mobile\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Des cybercriminels infiltrent le r\u00e9seau d\u2019entreprise de T-Mobile - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/fr\/des-cybercriminels-infiltrent-le-reseau-dentreprise-de-t-mobile\/","og_locale":"fr_FR","og_type":"article","og_title":"Des cybercriminels infiltrent le r\u00e9seau d\u2019entreprise de T-Mobile - Perseus Technologies","og_description":"26.04.2022 Vuln\u00e9rabilit\u00e9 critique dans Microsoft Exchange Server Une fois de plus, un incident cybern\u00e9tique a eu lieu chez le fournisseur de t\u00e9l\u00e9communications T-Mobile. Des hackers criminels ont r\u00e9ussi \u00e0 p\u00e9n\u00e9trer le r\u00e9seau de l\u2019entreprise gr\u00e2ce \u00e0 des identifiants vol\u00e9s et \u00e0 acc\u00e9der au logiciel d\u2019exploitation. Dans notre article de blog, vous d\u00e9couvrirez comment les \u00e9v\u00e9nements [&hellip;]","og_url":"https:\/\/perseus.de\/fr\/des-cybercriminels-infiltrent-le-reseau-dentreprise-de-t-mobile\/","og_site_name":"Perseus Technologies","article_published_time":"2022-04-26T07:52:00+00:00","article_modified_time":"2026-03-31T05:24:27+00:00","og_image":[{"width":1200,"height":300,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Xenia Silbe","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/fr\/des-cybercriminels-infiltrent-le-reseau-dentreprise-de-t-mobile\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/fr\/des-cybercriminels-infiltrent-le-reseau-dentreprise-de-t-mobile\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Des cybercriminels infiltrent le r\u00e9seau d\u2019entreprise de T-Mobile","datePublished":"2022-04-26T07:52:00+00:00","dateModified":"2026-03-31T05:24:27+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/fr\/des-cybercriminels-infiltrent-le-reseau-dentreprise-de-t-mobile\/"},"wordCount":535,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/fr\/des-cybercriminels-infiltrent-le-reseau-dentreprise-de-t-mobile\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png","articleSection":["Alerte aux dangers"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/fr\/des-cybercriminels-infiltrent-le-reseau-dentreprise-de-t-mobile\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/fr\/des-cybercriminels-infiltrent-le-reseau-dentreprise-de-t-mobile\/","url":"https:\/\/perseus.de\/fr\/des-cybercriminels-infiltrent-le-reseau-dentreprise-de-t-mobile\/","name":"Des cybercriminels infiltrent le r\u00e9seau d\u2019entreprise de T-Mobile - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/fr\/des-cybercriminels-infiltrent-le-reseau-dentreprise-de-t-mobile\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/fr\/des-cybercriminels-infiltrent-le-reseau-dentreprise-de-t-mobile\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png","datePublished":"2022-04-26T07:52:00+00:00","dateModified":"2026-03-31T05:24:27+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/fr\/des-cybercriminels-infiltrent-le-reseau-dentreprise-de-t-mobile\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/fr\/des-cybercriminels-infiltrent-le-reseau-dentreprise-de-t-mobile\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/fr\/des-cybercriminels-infiltrent-le-reseau-dentreprise-de-t-mobile\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/fr\/des-cybercriminels-infiltrent-le-reseau-dentreprise-de-t-mobile\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Des cybercriminels infiltrent le r\u00e9seau d\u2019entreprise de T-Mobile"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/fr\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27840","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/comments?post=27840"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27840\/revisions"}],"predecessor-version":[{"id":27841,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27840\/revisions\/27841"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media?parent=27840"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/categories?post=27840"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/tags?post=27840"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}