{"id":27898,"date":"2021-08-19T16:31:00","date_gmt":"2021-08-19T14:31:00","guid":{"rendered":"https:\/\/perseus.de\/un-incident-de-cybersecurite-chez-t-mobile-us-touche-des-millions-de-clients\/"},"modified":"2026-03-31T07:33:28","modified_gmt":"2026-03-31T05:33:28","slug":"un-incident-de-cybersecurite-chez-t-mobile-us-touche-des-millions-de-clients","status":"publish","type":"post","link":"https:\/\/perseus.de\/fr\/un-incident-de-cybersecurite-chez-t-mobile-us-touche-des-millions-de-clients\/","title":{"rendered":"Un incident de cybers\u00e9curit\u00e9 chez T-Mobile US touche des millions de clients"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27898\" class=\"elementor elementor-27898 elementor-22949\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dcf4ec4 e-flex e-con-boxed e-con e-parent\" data-id=\"dcf4ec4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e1db58c elementor-widget elementor-widget-image\" data-id=\"e1db58c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"200\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\" class=\"attachment-large size-large wp-image-27802\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png 1024w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-300x75.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-768x192.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025.png 1200w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1258a43 e-flex e-con-boxed e-con e-parent\" data-id=\"1258a43\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2de4e88 e-con-full e-flex e-con e-child\" data-id=\"2de4e88\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4982c80 elementor-widget elementor-widget-text-editor\" data-id=\"4982c80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>19.08.2021<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8348bc5 elementor-widget elementor-widget-heading\" data-id=\"8348bc5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybers\u00e9curit\u00e9<br>Un incident chez T-Mobile US touche des millions de clients<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb03842 e-con-full e-flex e-con e-child\" data-id=\"eb03842\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-91d0988 elementor-widget elementor-widget-text-editor\" data-id=\"91d0988\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Lors d\u2019une attaque contre T-Mobile US, au moins 40 millions de clients ont \u00e9t\u00e9 vol\u00e9es des donn\u00e9es. Nous allons au c\u0153ur de ce qui s\u2019est exactement pass\u00e9 et de ce que vous pouvez faire vous-m\u00eame. <\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f85a5ad e-flex e-con-boxed e-con e-parent\" data-id=\"f85a5ad\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-fad2031 e-con-full e-flex e-con e-child\" data-id=\"fad2031\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8282d30 elementor-widget elementor-widget-text-editor\" data-id=\"8282d30\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Que s\u2019est-il pass\u00e9 ?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ee744d2 e-con-full e-flex e-con e-child\" data-id=\"ee744d2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5ea6506 elementor-widget elementor-widget-text-editor\" data-id=\"5ea6506\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Le 16 ao\u00fbt, la filiale de Deutsche Telekom, T-Mobile US, a annonc\u00e9 avoir <a href=\"https:\/\/www.t-mobile.com\/news\/network\/cybersecurity-incident-update-august-2021\" target=\"_blank\" rel=\"noopener\">\u00e9t\u00e9<\/a> victime d\u2019un incident de cybers\u00e9curit\u00e9. Des millions de donn\u00e9es clients sont affect\u00e9es. \u00c0 l\u2019origine, la soci\u00e9t\u00e9 supposait que la contrefa\u00e7on \u00e9tait limit\u00e9e au march\u00e9 am\u00e9ricain. N\u00e9anmoins, cela pourrait aussi avoir un impact sur d\u2019autres endroits \u00e0 travers le monde. Cependant, la porte d\u2019entr\u00e9e de l\u2019attaque avait \u00e9t\u00e9 identifi\u00e9e et ferm\u00e9e.    <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f1dfa8e e-flex e-con-boxed e-con e-parent\" data-id=\"f1dfa8e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bf4f09a elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"bf4f09a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a82985c e-flex e-con-boxed e-con e-parent\" data-id=\"a82985c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-482032b e-con-full e-flex e-con e-child\" data-id=\"482032b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b5f6a5c elementor-widget elementor-widget-text-editor\" data-id=\"b5f6a5c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>D\u00e9tails sur l\u2019ampleur de l\u2019attaque contre T-Mobile US<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8f5d6ed e-con-full e-flex e-con e-child\" data-id=\"8f5d6ed\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-057f5b5 elementor-widget elementor-widget-text-editor\" data-id=\"057f5b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Diff\u00e9rentes informations circulent actuellement sur l\u2019ampleur de l\u2019attaque.<\/p><p>Des chercheurs de <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/t-mobile-confirms-servers-were-hacked-investigates-data-breach\/\" target=\"_blank\" rel=\"noopener\">Bleeping Computer<\/a> ont contact\u00e9 l\u2019acteur malveillant qui a propos\u00e9 les bases de donn\u00e9es vol\u00e9es lors de l\u2019attaque. Le pirate a confirm\u00e9 que la base de donn\u00e9es contient les donn\u00e9es d\u2019environ 100 millions de clients T-Mobile, notamment : num\u00e9ros IMSI, num\u00e9ros IMEI, num\u00e9ros de t\u00e9l\u00e9phone, noms de clients, codes PIN de s\u00e9curit\u00e9, num\u00e9ros de s\u00e9curit\u00e9 sociale, num\u00e9ros de permis de conduire, date de naissance. Les donn\u00e9es remontent \u00e0 2004 et ont \u00e9t\u00e9 vol\u00e9es sur les serveurs de T-Mobile d\u00e9but ao\u00fbt.  <\/p><p>T-Mobile US, quant \u00e0 lui, a admis dans sa <a href=\"https:\/\/www.t-mobile.com\/news\/network\/additional-information-regarding-2021-cyberattack-investigation\" target=\"_blank\" rel=\"noopener\">mise \u00e0 jour<\/a> du 17 ao\u00fbt que, selon des enqu\u00eates pr\u00e9liminaires, plus de 40 millions d\u2019enregistrements de donn\u00e9es d\u2019anciens, actuels et potentiels clients sont affect\u00e9s. Dans les donn\u00e9es concern\u00e9es, il existe des diff\u00e9rences entre les clients pr\u00e9pay\u00e9s et postpay\u00e9s ou ceux int\u00e9ress\u00e9s par un contrat. Pour les quelque 850 000 clients pr\u00e9pay\u00e9s, le nom, le num\u00e9ro de t\u00e9l\u00e9phone et les codes PIN sont concern\u00e9s. Ces derniers ont \u00e9t\u00e9 r\u00e9initialis\u00e9s par pr\u00e9caution. Selon l\u2019\u00e9tat actuel, aucun signe n\u2019indique que des num\u00e9ros de t\u00e9l\u00e9phone, num\u00e9ros de compte, codes PIN, mots de passe ou informations financi\u00e8res aient \u00e9t\u00e9 compromis pour les clients contractuels et les parties int\u00e9ress\u00e9es. Les pr\u00e9noms et noms, la date de naissance, le num\u00e9ro de s\u00e9curit\u00e9 sociale et les informations sur le permis de conduire ou les pi\u00e8ces d\u2019identit\u00e9 sont affect\u00e9s (au moins partiellement).      <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6237d73 e-flex e-con-boxed e-con e-parent\" data-id=\"6237d73\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9dde6dc elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"9dde6dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-02dd0e9 e-flex e-con-boxed e-con e-parent\" data-id=\"02dd0e9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-16d621d e-con-full e-flex e-con e-child\" data-id=\"16d621d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-89904c7 elementor-widget elementor-widget-text-editor\" data-id=\"89904c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Quelle est la menace pour mon entreprise li\u00e9e \u00e0 l\u2019attaque contre T-Mobile US ?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fae461d e-con-full e-flex e-con e-child\" data-id=\"fae461d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0f04793 elementor-widget elementor-widget-text-editor\" data-id=\"0f04793\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Apr\u00e8s avoir acc\u00e9d\u00e9 aux donn\u00e9es mentionn\u00e9es ci-dessus, diff\u00e9rentes formes d\u2019attaque sont envisageables. L\u2019attaquant peut utiliser les donn\u00e9es personnelles pour une attaque de phishing par e-mail ou SMS, par exemple. Gr\u00e2ce aux informations divulgu\u00e9es, il peut vous manipuler de mani\u00e8re cibl\u00e9e. La fraude par \u00e9change de SIM est \u00e9galement envisageable. Comme <a href=\"https:\/\/www.europol.europa.eu\/newsroom\/news\/sim-highjackers-how-criminals-are-stealing-millions-highjacking-phone-numbers#:~:text=SIM%20swap%20fraud%20is%20committed,to%20the%20victim's%20phone%20number.\" target=\"_blank\" rel=\"noopener\">l\u2019explique<\/a> Europol : \u00ab La fraude par \u00e9change de SIM est commise lorsqu\u2019un escroc trompe l\u2019op\u00e9rateur mobile de la victime pour qu\u2019il porte son num\u00e9ro de portable sur une carte SIM en sa possession, commen\u00e7ant ainsi \u00e0 recevoir tous les appels et messages SMS, y compris les mots de passe \u00e0 usage unique, envoy\u00e9s au num\u00e9ro de t\u00e9l\u00e9phone de la victime. \u00bb    <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cdadbd8 e-flex e-con-boxed e-con e-parent\" data-id=\"cdadbd8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-104dd95 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"104dd95\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f6e5251 e-flex e-con-boxed e-con e-parent\" data-id=\"f6e5251\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f1cf26c e-con-full e-flex e-con e-child\" data-id=\"f1cf26c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ee082fd elementor-widget elementor-widget-text-editor\" data-id=\"ee082fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Que puis-je faire ?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bc25934 e-con-full e-flex e-con e-child\" data-id=\"bc25934\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2b46b6f elementor-widget elementor-widget-text-editor\" data-id=\"2b46b6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>T-Mobile a annonc\u00e9 qu\u2019elle voulait prot\u00e9ger toutes les personnes vuln\u00e9rables. L\u2019entreprise a annonc\u00e9 qu\u2019elle informerait les personnes concern\u00e9es et a conseill\u00e9 les mesures suivantes, entre autres : <\/p>\n<ul>\n<li>Protection d\u2019identit\u00e9 gratuite de 2 ans fournie par T-Mobile<\/li>\n<li>Changement de code PIN pour les clients postpay\u00e9s T-Mobile<\/li>\n<li>\u00c9tape suppl\u00e9mentaire pour prot\u00e9ger le compte mobile avec la fonction de protection contre la prise de contr\u00f4le des comptes pour les clients postpay\u00e9s<\/li>\n<li>Utilisation du site web cr\u00e9\u00e9 sp\u00e9cifiquement pour l\u2019incident, qui doit \u00eatre publi\u00e9 au cours de la journ\u00e9e<\/li>\n<\/ul>\n<p><br><\/p><p>Vous pouvez trouver plus <a href=\"https:\/\/www.t-mobile.com\/news\/network\/additional-information-regarding-2021-cyberattack-investigation\" target=\"_blank\" rel=\"noopener\">d\u2019informations ici<\/a>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a03f6e4 e-flex e-con-boxed e-con e-parent\" data-id=\"a03f6e4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b600db9 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"b600db9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5f622d6 e-flex e-con-boxed e-con e-parent\" data-id=\"5f622d6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9c1eeee e-con-full e-flex e-con e-child\" data-id=\"9c1eeee\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b305611 elementor-widget elementor-widget-text-editor\" data-id=\"b305611\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Ce que Pers\u00e9e recommande<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e889ec5 e-con-full e-flex e-con e-child\" data-id=\"e889ec5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-335618c elementor-widget elementor-widget-text-editor\" data-id=\"335618c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Si vous \u00eates client T-Mobile, nous vous recommandons de vous comporter comme si la violation de vos donn\u00e9es avait \u00e9t\u00e9 confirm\u00e9e :<\/p>\n<ul>\n<li>Pr\u00eatez une attention particuli\u00e8re aux messages tels que les SMS ou les e-mails qui peuvent imiter le message original de T-Mobile. Lisez attentivement ce message et v\u00e9rifiez-le pour d\u00e9tecter des fautes d\u2019orthographe ou de grammaire, des discours \u00e9tranges et des demandes. Tout cela peut indiquer un faux message.  <\/li>\n<li>Sachez que les agresseurs peuvent utiliser des informations vol\u00e9es lors de l\u2019incident pour vous tromper. Cela peut inclure un message li\u00e9 \u00e0 votre permis de conduire ou \u00e0 des situations o\u00f9 vous utilisez votre num\u00e9ro de s\u00e9curit\u00e9 sociale. <\/li>\n<li>En aucun cas vous ne devez cliquer sur des liens dans ces messages et ne pas divulguer d\u2019informations confidentielles. Si vous avez des doutes sur la gravit\u00e9 du message, contactez T-Mobile via les coordonn\u00e9es du site officiel de l\u2019entreprise.<\/li>\n<li>Maintenez une bonne hygi\u00e8ne cybern\u00e9tique.<\/li>\n<li>V\u00e9rifiez vos identifiants de connexion.<\/li>\n<li>Envisagez de changer votre code PIN.<\/li>\n<li>Assurez-vous que votre mot de passe est unique pour chaque portail que vous utilisez.<\/li>\n<li>Vous pouvez \u00e9galement utiliser un gestionnaire de mots de passe.<\/li>\n<\/ul>\n<p><br><\/p><p>Si vous avez des questions, l\u2019\u00e9quipe Perseus sera ravie de r\u00e9pondre \u00e0 ses clients.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>19.08.2021 Cybers\u00e9curit\u00e9Un incident chez T-Mobile US touche des millions de clients Lors d\u2019une attaque contre T-Mobile US, au moins 40 millions de clients ont \u00e9t\u00e9 vol\u00e9es des donn\u00e9es. Nous allons au c\u0153ur de ce qui s\u2019est exactement pass\u00e9 et de ce que vous pouvez faire vous-m\u00eame. Que s\u2019est-il pass\u00e9 ? Le 16 ao\u00fbt, la filiale [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[65],"tags":[],"class_list":["post-27898","post","type-post","status-publish","format-standard","hentry","category-alerte-aux-dangers"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Un incident de cybers\u00e9curit\u00e9 chez T-Mobile US touche des millions de clients - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/fr\/un-incident-de-cybersecurite-chez-t-mobile-us-touche-des-millions-de-clients\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Un incident de cybers\u00e9curit\u00e9 chez T-Mobile US touche des millions de clients - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"19.08.2021 Cybers\u00e9curit\u00e9Un incident chez T-Mobile US touche des millions de clients Lors d\u2019une attaque contre T-Mobile US, au moins 40 millions de clients ont \u00e9t\u00e9 vol\u00e9es des donn\u00e9es. Nous allons au c\u0153ur de ce qui s\u2019est exactement pass\u00e9 et de ce que vous pouvez faire vous-m\u00eame. Que s\u2019est-il pass\u00e9 ? Le 16 ao\u00fbt, la filiale [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/fr\/un-incident-de-cybersecurite-chez-t-mobile-us-touche-des-millions-de-clients\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-19T14:31:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-31T05:33:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/un-incident-de-cybersecurite-chez-t-mobile-us-touche-des-millions-de-clients\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/un-incident-de-cybersecurite-chez-t-mobile-us-touche-des-millions-de-clients\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Un incident de cybers\u00e9curit\u00e9 chez T-Mobile US touche des millions de clients\",\"datePublished\":\"2021-08-19T14:31:00+00:00\",\"dateModified\":\"2026-03-31T05:33:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/un-incident-de-cybersecurite-chez-t-mobile-us-touche-des-millions-de-clients\\\/\"},\"wordCount\":916,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/un-incident-de-cybersecurite-chez-t-mobile-us-touche-des-millions-de-clients\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\",\"articleSection\":[\"Alerte aux dangers\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/un-incident-de-cybersecurite-chez-t-mobile-us-touche-des-millions-de-clients\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/un-incident-de-cybersecurite-chez-t-mobile-us-touche-des-millions-de-clients\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/un-incident-de-cybersecurite-chez-t-mobile-us-touche-des-millions-de-clients\\\/\",\"name\":\"Un incident de cybers\u00e9curit\u00e9 chez T-Mobile US touche des millions de clients - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/un-incident-de-cybersecurite-chez-t-mobile-us-touche-des-millions-de-clients\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/un-incident-de-cybersecurite-chez-t-mobile-us-touche-des-millions-de-clients\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\",\"datePublished\":\"2021-08-19T14:31:00+00:00\",\"dateModified\":\"2026-03-31T05:33:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/un-incident-de-cybersecurite-chez-t-mobile-us-touche-des-millions-de-clients\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/un-incident-de-cybersecurite-chez-t-mobile-us-touche-des-millions-de-clients\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/un-incident-de-cybersecurite-chez-t-mobile-us-touche-des-millions-de-clients\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/un-incident-de-cybersecurite-chez-t-mobile-us-touche-des-millions-de-clients\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Un incident de cybers\u00e9curit\u00e9 chez T-Mobile US touche des millions de clients\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Un incident de cybers\u00e9curit\u00e9 chez T-Mobile US touche des millions de clients - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/fr\/un-incident-de-cybersecurite-chez-t-mobile-us-touche-des-millions-de-clients\/","og_locale":"fr_FR","og_type":"article","og_title":"Un incident de cybers\u00e9curit\u00e9 chez T-Mobile US touche des millions de clients - Perseus Technologies","og_description":"19.08.2021 Cybers\u00e9curit\u00e9Un incident chez T-Mobile US touche des millions de clients Lors d\u2019une attaque contre T-Mobile US, au moins 40 millions de clients ont \u00e9t\u00e9 vol\u00e9es des donn\u00e9es. Nous allons au c\u0153ur de ce qui s\u2019est exactement pass\u00e9 et de ce que vous pouvez faire vous-m\u00eame. Que s\u2019est-il pass\u00e9 ? Le 16 ao\u00fbt, la filiale [&hellip;]","og_url":"https:\/\/perseus.de\/fr\/un-incident-de-cybersecurite-chez-t-mobile-us-touche-des-millions-de-clients\/","og_site_name":"Perseus Technologies","article_published_time":"2021-08-19T14:31:00+00:00","article_modified_time":"2026-03-31T05:33:28+00:00","og_image":[{"width":1200,"height":300,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Xenia Silbe","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/fr\/un-incident-de-cybersecurite-chez-t-mobile-us-touche-des-millions-de-clients\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/fr\/un-incident-de-cybersecurite-chez-t-mobile-us-touche-des-millions-de-clients\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Un incident de cybers\u00e9curit\u00e9 chez T-Mobile US touche des millions de clients","datePublished":"2021-08-19T14:31:00+00:00","dateModified":"2026-03-31T05:33:28+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/fr\/un-incident-de-cybersecurite-chez-t-mobile-us-touche-des-millions-de-clients\/"},"wordCount":916,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/fr\/un-incident-de-cybersecurite-chez-t-mobile-us-touche-des-millions-de-clients\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png","articleSection":["Alerte aux dangers"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/fr\/un-incident-de-cybersecurite-chez-t-mobile-us-touche-des-millions-de-clients\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/fr\/un-incident-de-cybersecurite-chez-t-mobile-us-touche-des-millions-de-clients\/","url":"https:\/\/perseus.de\/fr\/un-incident-de-cybersecurite-chez-t-mobile-us-touche-des-millions-de-clients\/","name":"Un incident de cybers\u00e9curit\u00e9 chez T-Mobile US touche des millions de clients - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/fr\/un-incident-de-cybersecurite-chez-t-mobile-us-touche-des-millions-de-clients\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/fr\/un-incident-de-cybersecurite-chez-t-mobile-us-touche-des-millions-de-clients\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png","datePublished":"2021-08-19T14:31:00+00:00","dateModified":"2026-03-31T05:33:28+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/fr\/un-incident-de-cybersecurite-chez-t-mobile-us-touche-des-millions-de-clients\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/fr\/un-incident-de-cybersecurite-chez-t-mobile-us-touche-des-millions-de-clients\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/fr\/un-incident-de-cybersecurite-chez-t-mobile-us-touche-des-millions-de-clients\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/fr\/un-incident-de-cybersecurite-chez-t-mobile-us-touche-des-millions-de-clients\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Un incident de cybers\u00e9curit\u00e9 chez T-Mobile US touche des millions de clients"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/fr\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27898","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/comments?post=27898"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27898\/revisions"}],"predecessor-version":[{"id":27899,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27898\/revisions\/27899"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media?parent=27898"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/categories?post=27898"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/tags?post=27898"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}