{"id":28140,"date":"2025-05-13T17:20:22","date_gmt":"2025-05-13T15:20:22","guid":{"rendered":"https:\/\/perseus.de\/en-resume-les-concessions-automobiles-sont-des-victimes-faciles-de-fraudes-par-e-mail\/"},"modified":"2026-03-31T14:37:07","modified_gmt":"2026-03-31T12:37:07","slug":"en-resume-les-concessions-automobiles-sont-des-victimes-faciles-de-fraudes-par-e-mail","status":"publish","type":"post","link":"https:\/\/perseus.de\/fr\/en-resume-les-concessions-automobiles-sont-des-victimes-faciles-de-fraudes-par-e-mail\/","title":{"rendered":"En r\u00e9sum\u00e9 : les concessions automobiles sont des victimes faciles de fraudes par e-mail"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"28140\" class=\"elementor elementor-28140 elementor-23029\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba0588 e-flex e-con-boxed e-con e-parent\" data-id=\"2ba0588\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5424324 e-con-full e-flex e-con e-child\" data-id=\"5424324\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-30992b0 e-con-full e-flex e-con e-child\" data-id=\"30992b0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6493f26 e-con-full e-flex e-con e-child\" data-id=\"6493f26\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52d785d elementor-widget elementor-widget-heading\" data-id=\"52d785d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">En r\u00e9sum\u00e9 : les concessions automobiles sont des victimes faciles de fraudes par e-mail\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b2585ee elementor-widget elementor-widget-text-editor\" data-id=\"b2585ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em>Les entreprises de divers secteurs d\u00e9pendent aujourd\u2019hui fortement de la communication par e-mail et des transactions en ligne pour leurs activit\u00e9s. Cependant, aussi efficace que soit cette fa\u00e7on de faire des affaires, elle ouvre aussi la porte \u00e0 des menaces de cybers\u00e9curit\u00e9, telles que les e-mails et la fraude \u00e9lectronique.   <\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6459d3d elementor-widget elementor-widget-image\" data-id=\"6459d3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"458\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/iStock-1411355731-768x458-1.jpg\" class=\"attachment-medium_large size-medium_large wp-image-28139\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/iStock-1411355731-768x458-1.jpg 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/iStock-1411355731-768x458-1-300x179.jpg 300w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source de l\u2019image : bigtunaonline via istockphoto<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0912818 e-flex e-con-boxed e-con e-parent\" data-id=\"0912818\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8aa38b0 elementor-widget elementor-widget-text-editor\" data-id=\"8aa38b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4>En raison des \u00e9v\u00e9nements actuels<\/h4><p>L\u2019\u00e9quipe de gestion de la r\u00e9ponse aux incidents de Perseus observe une augmentation des cas de fraude par e-mail dans l\u2019industrie automobile. Les employ\u00e9s des concessionnaires automobiles ont \u00e9t\u00e9 touch\u00e9s. Pensant \u00eatre en contact avec des entreprises r\u00e9put\u00e9es qui proposaient aux concessionnaires la possibilit\u00e9 d\u2019acheter des v\u00e9hicules \u00e0 bas prix pour les revendre, les personnes concern\u00e9es ont correspondu avec des acteurs malveillants plut\u00f4t qu\u2019avec des vendeurs l\u00e9gitimes et ont \u00e9t\u00e9 victimes de tentatives de tromperie avec de lourdes pertes financi\u00e8res.  <\/p><p>Cet article analyse la nature sophistiqu\u00e9e de ces arnaques et tire des conclusions sur la s\u00e9curisation d\u2019entreprises pertinentes \u00e0 travers les secteurs et qui affectent toutes les entreprises de mani\u00e8re \u00e9gale.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4a91556 e-flex e-con-boxed e-con e-parent\" data-id=\"4a91556\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-940521b elementor-widget elementor-widget-text-editor\" data-id=\"940521b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4>Que s\u2019est-il pass\u00e9 ?<\/h4><p><img decoding=\"async\" class=\"alignleft wp-image-23035 size-full\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Scam-Alert_Laptop-400x245-1.png\" alt=\"\" width=\"400\" height=\"245\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Scam-Alert_Laptop-400x245-1.png 400w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Scam-Alert_Laptop-400x245-1-300x184.png 300w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/>Tout a commenc\u00e9 apparemment de mani\u00e8re inoffensive : les employ\u00e9s des concessionnaires automobiles recevaient r\u00e9guli\u00e8rement des courriels d\u2019une soci\u00e9t\u00e9 de location bien connue qui proposait des voitures \u00e0 vendre aux concessionnaires \u00e0 bas prix \u2013 parfois m\u00eame \u00e0 des r\u00e9ductions tr\u00e8s avantageuses. C\u2019est une pratique courante dans l\u2019industrie automobile. Les employ\u00e9s faisaient confiance \u00e0 la l\u00e9galit\u00e9 des e-mails, correspondaient avec les exp\u00e9diteurs et ont finalement re\u00e7u des offres d\u00e9finitives d\u2019achat des v\u00e9hicules.  <\/p><p> <\/p><p>Au fil de la correspondance, tout s\u2019est d\u00e9roul\u00e9 selon les processus commerciaux habituels. Les employ\u00e9s recevaient des e-mails et documents d\u2019apparence authentique, y compris des factures dans le design de la location de voiture. Toutes les informations contenues dans les e-mails correspondaient aux donn\u00e9es originales de la soci\u00e9t\u00e9 de location de voitures, \u00e0 l\u2019exception d\u2019un domaine l\u00e9g\u00e8rement modifi\u00e9.  <\/p><p>Convaincus de l\u2019authenticit\u00e9 de la communication, les employ\u00e9s effectuaient les transactions et payaient des sommes importantes pour les v\u00e9hicules comme demand\u00e9. Avec le temps, cependant, des doutes sont apparus parmi les employ\u00e9s. Malgr\u00e9 les paiements effectu\u00e9s, ils n\u2019ont pas re\u00e7u les certificats d\u2019immatriculation des v\u00e9hicules, qui sont g\u00e9n\u00e9ralement remis imm\u00e9diatement apr\u00e8s l\u2019achat. Inquiets, ils ont contact\u00e9 le suppos\u00e9 vendeur, la soci\u00e9t\u00e9 de location de voitures, pour d\u00e9couvrir qu\u2019il n\u2019y avait aucune trace de la transaction. Les concessionnaires automobiles \u00e9taient tomb\u00e9s dans une arnaque.    <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e53c2f1 e-flex e-con-boxed e-con e-parent\" data-id=\"e53c2f1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-65ddef8 elementor-widget elementor-widget-heading\" data-id=\"65ddef8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Comment les assaillants ont-ils agi ?\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fb62d5b e-flex e-con-boxed e-con e-parent\" data-id=\"fb62d5b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-98168dc elementor-widget elementor-widget-text-editor\" data-id=\"98168dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>En y regardant de plus pr\u00e8s, il s\u2019est av\u00e9r\u00e9 que la communication venait d\u2019un attaquant qui avait configur\u00e9 un domaine et une adresse e-mail trompeurs imitant ceux de l\u2019entreprise l\u00e9gitime. Ce qui semblait initialement \u00eatre une transaction commerciale l\u00e9gitime s\u2019est av\u00e9r\u00e9 \u00eatre un cas sophistiqu\u00e9 de fraude par e-mail et \u00e9lectronique. On pr\u00e9tendait vendre des v\u00e9hicules \u00e0 partir des actions de la soci\u00e9t\u00e9 de location automobile \u00e0 un prix nettement inf\u00e9rieur. Particuli\u00e8rement p\u00e9rilleux : les v\u00e9hicules promis par les criminels \u00e9taient en r\u00e9alit\u00e9 mis en vente en ligne par la soci\u00e9t\u00e9 de location de voitures.   <\/p><p>Dans ce cas, cependant, les personnes cibl\u00e9es ne communiquaient avec des tiers que via un domaine tiers cr\u00e9\u00e9 pour la fraude. Les assaillants ont soigneusement \u00e9labor\u00e9 les e-mails et documents et ont imit\u00e9 le style et la marque de la soci\u00e9t\u00e9 de location, rendant presque impossible pour les employ\u00e9s de reconna\u00eetre la nature frauduleuse de la communication. <\/p><p>Les acteurs malveillants ont \u00e9galement falsifi\u00e9 des factures convaincantes avec des informations bancaires pour le paiement. Ce n\u2019est qu\u2019\u00e0 travers les d\u00e9tails bancaires qu\u2019on a pu remarquer que le titulaire du compte \u00e9tait un tiers. Ici aussi, les fraudeurs auraient pu donner un autre nom, car les banques ne v\u00e9rifient l\u2019IBAN que depuis des ann\u00e9es.  <\/p><p>Les assaillants ont profit\u00e9 de la pratique courante consistant \u00e0 acheter des v\u00e9hicules par e-mail et ont abus\u00e9 de la familiarit\u00e9 du processus pour mener \u00e0 bien leur tentative de fraude.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-52b3657 e-flex e-con-boxed e-con e-parent\" data-id=\"52b3657\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c809314 elementor-widget elementor-widget-text-editor\" data-id=\"c809314\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4>Qu\u2019a r\u00e9v\u00e9l\u00e9 l\u2019analyse ?<\/h4><p>L\u2019enqu\u00eate m\u00e9dico-l\u00e9gale men\u00e9e par l\u2019\u00e9quipe d\u2019intervention de Perseus a r\u00e9v\u00e9l\u00e9 que l\u2019incident \u00e9tait une forme d\u2019arnaque par e-mail et virement bancaire visant actuellement divers concessionnaires automobiles. Certains des e-mails en question n\u2019\u00e9taient pas sp\u00e9cifiquement adress\u00e9s aux entreprises, mais \u00e0 plusieurs destinataires en m\u00eame temps. C\u2019est ce qu\u2019on appelle les \u00ab destinataires non divulgu\u00e9s \u00bb. Cette m\u00e9thode sert \u00e0 dissimuler les v\u00e9ritables destinataires de l\u2019email.   <\/p><p>Apr\u00e8s un examen approfondi du document de facture re\u00e7u, l\u2019analyse m\u00e9dico-l\u00e9gale n\u2019a r\u00e9v\u00e9l\u00e9 aucune information suppl\u00e9mentaire sur l\u2019identit\u00e9 du coupable. La facture \u00e9tait \u00e9tiquet\u00e9e \u00ab Microsoft Word pour M365 \u00bb. Cela semble atypique pour ce processus.  <\/p><p>Des enqu\u00eates ult\u00e9rieures ont r\u00e9v\u00e9l\u00e9 que le domaine Internet enregistr\u00e9 par l\u2019attaquant avait \u00e9galement \u00e9t\u00e9 supprim\u00e9 au moment de la v\u00e9rification \u2013 vraisemblablement \u00e0 l\u2019instigation de l\u2019entreprise ou du fournisseur de domaine. L\u2019\u00e9quipe d\u2019experts de Perseus n\u2019a pas pu acc\u00e9der aux donn\u00e9es du titulaire en raison des r\u00e9glementations du RGPD. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f945541 e-flex e-con-boxed e-con e-parent\" data-id=\"f945541\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-83d95b2 e-con-full e-flex e-con e-child\" data-id=\"83d95b2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3d6f819 elementor-widget elementor-widget-text-editor\" data-id=\"3d6f819\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4>Quelles mesures sont recommand\u00e9es ?<\/h4><p>L\u2019incident met en lumi\u00e8re la vuln\u00e9rabilit\u00e9 des entreprises face \u00e0 la fraude par e-mail et par \u00e9lectromagn\u00e9tique et souligne la n\u00e9cessit\u00e9 de renforcer les mesures de s\u00e9curit\u00e9 et d\u2019un contr\u00f4le plus strict des communications par email. L\u2019\u00e9quipe d\u2019experts de Perseus a recommand\u00e9 que les concessionnaires concern\u00e9s d\u00e9posent des poursuites p\u00e9nales afin de pouvoir engager d\u2019autres poursuites judiciaires contre le coupable. Un point de contact appropri\u00e9 est le \u00ab Point de contact central pour la criminalit\u00e9 informatique \u00bb. C\u2019est une agence sp\u00e9cialis\u00e9e qui poss\u00e8de de l\u2019exp\u00e9rience dans le traitement des affaires de cybercriminalit\u00e9.   <\/p><p><img decoding=\"async\" class=\"alignright wp-image-23036 size-full\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Statistik-Image-Blog-case-Study-1-400x260-1.png\" alt=\"\" width=\"400\" height=\"260\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Statistik-Image-Blog-case-Study-1-400x260-1.png 400w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Statistik-Image-Blog-case-Study-1-400x260-1-300x195.png 300w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/>De plus, le client a \u00e9t\u00e9 conseill\u00e9 de sensibiliser sp\u00e9cifiquement ses employ\u00e9s aux cybermenaces, notamment sur la mani\u00e8re d\u2019identifier et de r\u00e9duire les risques li\u00e9s \u00e0 la fraude par e-mail et financi\u00e8re.<\/p><p>Le titulaire de la police a \u00e9galement \u00e9t\u00e9 fortement conseill\u00e9 de r\u00e9viser le processus d\u2019achat et la transaction commerciale. D\u2019autres \u00e9tapes de v\u00e9rification, telles que la confirmation t\u00e9l\u00e9phonique directe aupr\u00e8s de la soci\u00e9t\u00e9 m\u00e8re du vendeur, devraient \u00eatre mises en place pour confirmer la l\u00e9gitimit\u00e9 des transactions et pr\u00e9venir des incidents similaires \u00e0 l\u2019avenir. En particulier, l\u2019IBAN doit \u00eatre v\u00e9rifi\u00e9 pour d\u00e9tecter facilement la fraude.  <\/p><p>En prenant des mesures actives telles que le signalement de l\u2019incident, l\u2019investissement dans la formation des employ\u00e9s et la simplification du processus d\u2019achat, les entreprises peuvent renforcer leur protection contre la fraude par e-mail et les communications \u00e9lectroniques.<\/p><p>Le sc\u00e9nario actuel ne se limite en aucun cas \u00e0 l\u2019industrie automobile. Des tactiques similaires pourraient \u00eatre utilis\u00e9es dans d\u2019autres industries avec des processus d\u2019achat comparables. Des secteurs comme l\u2019immobilier, la fabrication et la vente en gros sont souvent trait\u00e9s par e-mail ou virement bancaire. Les techniques frauduleuses utilis\u00e9es dans ce cas servent de mise en garde aux entreprises de tous secteurs vuln\u00e9rables \u00e0 la fraude.   <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4cd77b0 e-flex e-con-boxed e-con e-parent\" data-id=\"4cd77b0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-db259ac e-con-full e-flex e-con e-child\" data-id=\"db259ac\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c698d50 e-con-full e-flex e-con e-child\" data-id=\"c698d50\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c00403d elementor-widget elementor-widget-heading\" data-id=\"c00403d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">T\u00e9l\u00e9chargez l\u2019\u00e9tude de cas pour en apprendre davantage :\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26b0922 elementor-widget elementor-widget-text-editor\" data-id=\"26b0922\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul class=\"List List--checkmark\">\n<li>Comment les assaillants ont-ils proc\u00e9d\u00e9 concr\u00e8tement ?<\/li>\n<li>Quelles ont \u00e9t\u00e9 les cons\u00e9quences pour les parties concern\u00e9es ?<\/li>\n<li>Quels conseils nos experts donnent-ils aux entreprises touch\u00e9es par ce type d\u2019attaques ?<\/li>\n<li>Quelles mesures devraient \u00eatre prises pour pr\u00e9venir ces attaques ?<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-626d01e e-con-full e-flex e-con e-child\" data-id=\"626d01e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f6a7820 e-con-full e-flex e-con e-child\" data-id=\"f6a7820\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-072ed64 elementor-widget elementor-widget-html\" data-id=\"072ed64\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<iframe style=\"display: block; margin-left: auto; margin-right: auto; max-width: 100%;\" src=\"https:\/\/8cd7d579.sibforms.com\/serve\/MUIFABGuwsgecRRy3NfINXNItvzC3JxoCrNipbR7cauu9g5HCO3Si7pw7HETzsrlXLtjXZbP5K5RrbrXR4Jow8BqlVnYfk52HTQ3T93o6lFs9uGxZjPZPwCY5Jv9glxGpUmUKVJnRmJzva5IHUPIczhe8wbqdJANyNDXnjNbR8UzKymtmKMfTwYyfRT-dG4_hnK6kypbQ3DwG5xK\" width=\"540\" height=\"700\" frameborder=\"0\" scrolling=\"auto\" allowfullscreen=\"allowfullscreen\"><\/iframe>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b84d216 e-flex e-con-boxed e-con e-parent\" data-id=\"b84d216\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b869a7a elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"b869a7a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Les entreprises de divers secteurs d\u00e9pendent aujourd\u2019hui fortement de la communication par e-mail et des transactions en ligne pour leurs activit\u00e9s. Cependant, aussi efficace que soit cette fa\u00e7on de faire des affaires, elle ouvre aussi la porte \u00e0 des menaces de cybers\u00e9curit\u00e9, telles que les e-mails et la fraude \u00e9lectronique.   <\/p>\n","protected":false},"author":3,"featured_media":28139,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[68],"tags":[],"class_list":["post-28140","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-etudes-de-cas"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>En r\u00e9sum\u00e9 : les concessions automobiles sont des victimes faciles de fraudes par e-mail - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/fr\/en-resume-les-concessions-automobiles-sont-des-victimes-faciles-de-fraudes-par-e-mail\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"En r\u00e9sum\u00e9 : les concessions automobiles sont des victimes faciles de fraudes par e-mail - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Les entreprises de divers secteurs d\u00e9pendent aujourd\u2019hui fortement de la communication par e-mail et des transactions en ligne pour leurs activit\u00e9s. Cependant, aussi efficace que soit cette fa\u00e7on de faire des affaires, elle ouvre aussi la porte \u00e0 des menaces de cybers\u00e9curit\u00e9, telles que les e-mails et la fraude \u00e9lectronique.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/fr\/en-resume-les-concessions-automobiles-sont-des-victimes-faciles-de-fraudes-par-e-mail\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-13T15:20:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-31T12:37:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/iStock-1411355731-768x458-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"768\" \/>\n\t<meta property=\"og:image:height\" content=\"458\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/en-resume-les-concessions-automobiles-sont-des-victimes-faciles-de-fraudes-par-e-mail\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/en-resume-les-concessions-automobiles-sont-des-victimes-faciles-de-fraudes-par-e-mail\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"En r\u00e9sum\u00e9 : les concessions automobiles sont des victimes faciles de fraudes par e-mail\",\"datePublished\":\"2025-05-13T15:20:22+00:00\",\"dateModified\":\"2026-03-31T12:37:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/en-resume-les-concessions-automobiles-sont-des-victimes-faciles-de-fraudes-par-e-mail\\\/\"},\"wordCount\":1341,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/en-resume-les-concessions-automobiles-sont-des-victimes-faciles-de-fraudes-par-e-mail\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/iStock-1411355731-768x458-1.jpg\",\"articleSection\":[\"\u00c9tudes de cas\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/en-resume-les-concessions-automobiles-sont-des-victimes-faciles-de-fraudes-par-e-mail\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/en-resume-les-concessions-automobiles-sont-des-victimes-faciles-de-fraudes-par-e-mail\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/en-resume-les-concessions-automobiles-sont-des-victimes-faciles-de-fraudes-par-e-mail\\\/\",\"name\":\"En r\u00e9sum\u00e9 : les concessions automobiles sont des victimes faciles de fraudes par e-mail - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/en-resume-les-concessions-automobiles-sont-des-victimes-faciles-de-fraudes-par-e-mail\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/en-resume-les-concessions-automobiles-sont-des-victimes-faciles-de-fraudes-par-e-mail\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/iStock-1411355731-768x458-1.jpg\",\"datePublished\":\"2025-05-13T15:20:22+00:00\",\"dateModified\":\"2026-03-31T12:37:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/en-resume-les-concessions-automobiles-sont-des-victimes-faciles-de-fraudes-par-e-mail\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/en-resume-les-concessions-automobiles-sont-des-victimes-faciles-de-fraudes-par-e-mail\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/en-resume-les-concessions-automobiles-sont-des-victimes-faciles-de-fraudes-par-e-mail\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/iStock-1411355731-768x458-1.jpg\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/iStock-1411355731-768x458-1.jpg\",\"width\":768,\"height\":458,\"caption\":\"Fond flou avec l\u2019ext\u00e9rieur de la concession automobile. Photo abstraite floue d\u2019un showroom automobile moderne de construction. \u00c9clairage bouteux du bureau dans la salle d\u2019exposition automobile. Atelier automobile\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/en-resume-les-concessions-automobiles-sont-des-victimes-faciles-de-fraudes-par-e-mail\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"En r\u00e9sum\u00e9 : les concessions automobiles sont des victimes faciles de fraudes par e-mail\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"En r\u00e9sum\u00e9 : les concessions automobiles sont des victimes faciles de fraudes par e-mail - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/fr\/en-resume-les-concessions-automobiles-sont-des-victimes-faciles-de-fraudes-par-e-mail\/","og_locale":"fr_FR","og_type":"article","og_title":"En r\u00e9sum\u00e9 : les concessions automobiles sont des victimes faciles de fraudes par e-mail - Perseus Technologies","og_description":"Les entreprises de divers secteurs d\u00e9pendent aujourd\u2019hui fortement de la communication par e-mail et des transactions en ligne pour leurs activit\u00e9s. Cependant, aussi efficace que soit cette fa\u00e7on de faire des affaires, elle ouvre aussi la porte \u00e0 des menaces de cybers\u00e9curit\u00e9, telles que les e-mails et la fraude \u00e9lectronique.","og_url":"https:\/\/perseus.de\/fr\/en-resume-les-concessions-automobiles-sont-des-victimes-faciles-de-fraudes-par-e-mail\/","og_site_name":"Perseus Technologies","article_published_time":"2025-05-13T15:20:22+00:00","article_modified_time":"2026-03-31T12:37:07+00:00","og_image":[{"width":768,"height":458,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/iStock-1411355731-768x458-1.jpg","type":"image\/jpeg"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Xenia Silbe","Dur\u00e9e de lecture estim\u00e9e":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/fr\/en-resume-les-concessions-automobiles-sont-des-victimes-faciles-de-fraudes-par-e-mail\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/fr\/en-resume-les-concessions-automobiles-sont-des-victimes-faciles-de-fraudes-par-e-mail\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"En r\u00e9sum\u00e9 : les concessions automobiles sont des victimes faciles de fraudes par e-mail","datePublished":"2025-05-13T15:20:22+00:00","dateModified":"2026-03-31T12:37:07+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/fr\/en-resume-les-concessions-automobiles-sont-des-victimes-faciles-de-fraudes-par-e-mail\/"},"wordCount":1341,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/fr\/en-resume-les-concessions-automobiles-sont-des-victimes-faciles-de-fraudes-par-e-mail\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/iStock-1411355731-768x458-1.jpg","articleSection":["\u00c9tudes de cas"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/fr\/en-resume-les-concessions-automobiles-sont-des-victimes-faciles-de-fraudes-par-e-mail\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/fr\/en-resume-les-concessions-automobiles-sont-des-victimes-faciles-de-fraudes-par-e-mail\/","url":"https:\/\/perseus.de\/fr\/en-resume-les-concessions-automobiles-sont-des-victimes-faciles-de-fraudes-par-e-mail\/","name":"En r\u00e9sum\u00e9 : les concessions automobiles sont des victimes faciles de fraudes par e-mail - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/fr\/en-resume-les-concessions-automobiles-sont-des-victimes-faciles-de-fraudes-par-e-mail\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/fr\/en-resume-les-concessions-automobiles-sont-des-victimes-faciles-de-fraudes-par-e-mail\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/iStock-1411355731-768x458-1.jpg","datePublished":"2025-05-13T15:20:22+00:00","dateModified":"2026-03-31T12:37:07+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/fr\/en-resume-les-concessions-automobiles-sont-des-victimes-faciles-de-fraudes-par-e-mail\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/fr\/en-resume-les-concessions-automobiles-sont-des-victimes-faciles-de-fraudes-par-e-mail\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/fr\/en-resume-les-concessions-automobiles-sont-des-victimes-faciles-de-fraudes-par-e-mail\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/iStock-1411355731-768x458-1.jpg","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/iStock-1411355731-768x458-1.jpg","width":768,"height":458,"caption":"Fond flou avec l\u2019ext\u00e9rieur de la concession automobile. Photo abstraite floue d\u2019un showroom automobile moderne de construction. \u00c9clairage bouteux du bureau dans la salle d\u2019exposition automobile. Atelier automobile"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/fr\/en-resume-les-concessions-automobiles-sont-des-victimes-faciles-de-fraudes-par-e-mail\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"En r\u00e9sum\u00e9 : les concessions automobiles sont des victimes faciles de fraudes par e-mail"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/fr\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/28140","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/comments?post=28140"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/28140\/revisions"}],"predecessor-version":[{"id":28141,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/28140\/revisions\/28141"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media\/28139"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media?parent=28140"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/categories?post=28140"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/tags?post=28140"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}