{"id":28151,"date":"2025-03-06T17:26:00","date_gmt":"2025-03-06T16:26:00","guid":{"rendered":"https:\/\/perseus.de\/en-resume-un-incident-de-securite-informatique-sur-trois-coins\/"},"modified":"2026-03-31T14:38:16","modified_gmt":"2026-03-31T12:38:16","slug":"en-resume-un-incident-de-securite-informatique-sur-trois-coins","status":"publish","type":"post","link":"https:\/\/perseus.de\/fr\/en-resume-un-incident-de-securite-informatique-sur-trois-coins\/","title":{"rendered":"En r\u00e9sum\u00e9 : un incident de s\u00e9curit\u00e9 informatique sur trois coins"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"28151\" class=\"elementor elementor-28151 elementor-23049\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba0588 e-flex e-con-boxed e-con e-parent\" data-id=\"2ba0588\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5424324 e-con-full e-flex e-con e-child\" data-id=\"5424324\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-30992b0 e-con-full e-flex e-con e-child\" data-id=\"30992b0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6493f26 e-con-full e-flex e-con e-child\" data-id=\"6493f26\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52d785d elementor-widget elementor-widget-heading\" data-id=\"52d785d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">En r\u00e9sum\u00e9 : un incident de s\u00e9curit\u00e9 informatique sur trois coins\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b2585ee elementor-widget elementor-widget-text-editor\" data-id=\"b2585ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em>Un restaurant a \u00e9t\u00e9 inform\u00e9 d\u2019un incident de s\u00e9curit\u00e9 informatique chez un fournisseur de logiciels utilis\u00e9 dont la plateforme est utilis\u00e9e pour la commande, l\u2019administration et les paiements. Les attaquants ont obtenu un acc\u00e8s non autoris\u00e9 \u00e0 des donn\u00e9es personnelles de clients, y compris des noms, des adresses e-mail et, dans certains cas, des informations de carte bancaire. Le d\u00e9clencheur \u00e9tait la faute d\u2019une employ\u00e9e comptable externe qui avait accidentellement saisi ses donn\u00e9es d\u2019acc\u00e8s sur une fausse page de connexion qui ressemblait de fa\u00e7on trompeuse \u00e0 la plateforme d\u2019origine.  <\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6459d3d elementor-widget elementor-widget-image\" data-id=\"6459d3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"600\" height=\"400\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/registration-3938434_1280-600x400-1.jpg\" class=\"attachment-medium_large size-medium_large wp-image-28150\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/registration-3938434_1280-600x400-1.jpg 600w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/registration-3938434_1280-600x400-1-300x200.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Cr\u00e9dit image : Gerd Altmann via Pixabay<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0912818 e-flex e-con-boxed e-con e-parent\" data-id=\"0912818\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8aa38b0 elementor-widget elementor-widget-text-editor\" data-id=\"8aa38b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><strong>Que s\u2019est-il pass\u00e9 ?<\/strong><\/h4><p><em>Veuillez noter que la pr\u00e9sente affaire repose sur un incident r\u00e9el. Afin de prot\u00e9ger l\u2019identit\u00e9 des parties concern\u00e9es, des noms fictifs sont utilis\u00e9s pour d\u00e9signer les soci\u00e9t\u00e9s et les personnes concern\u00e9es. <\/em><\/p><p>Un restaurant qui propose des commandes en ligne a \u00e9t\u00e9 inform\u00e9 d\u2019un incident de s\u00e9curit\u00e9 informatique chez l\u2019un de ses fournisseurs de logiciels. Ce fournisseur exploite la plateforme QuickEatery, que le restaurant utilise pour le syst\u00e8me de commande, l\u2019administration et le paiement, entre autres. <\/p><p>L\u2019op\u00e9rateur de QuickEatery a d\u00e9couvert un acc\u00e8s non autoris\u00e9 aux donn\u00e9es des clients. Des informations personnelles telles que les noms, les adresses e-mail et, dans certains cas, des donn\u00e9es sensibles, y compris les quatre derniers chiffres des cartes de cr\u00e9dit stock\u00e9es dans le syst\u00e8me, ont \u00e9t\u00e9 affect\u00e9es. Le prestataire de QuickEatery a ensuite inform\u00e9 tous les clients d\u2019entreprise concern\u00e9s, y compris le restaurant mentionn\u00e9.  <\/p><p>Cependant, l\u2019incident a \u00e9t\u00e9 caus\u00e9 par la faute d\u2019un tiers. Les criminels ont acc\u00e9d\u00e9 aux donn\u00e9es d\u2019acc\u00e8s de la plateforme QuickEatery gr\u00e2ce au comportement n\u00e9gligent d\u2019un employ\u00e9 d\u2019un cabinet comptable externe. Ce dernier a tent\u00e9 de se connecter \u00e0 la plateforme pour v\u00e9rifier les paiements entrants et les factures de l\u2019op\u00e9rateur de QuickEatery. Comme cela n\u2019a pas fonctionn\u00e9, elle a cherch\u00e9 en ligne un moyen alternatif de s\u2019enregistrer \u2013 et l\u2019a trouv\u00e9.   <\/p><p>Dans ce processus, elle est tomb\u00e9e sur un site web qui ressemblait trompeusement \u00e0 celui d\u2019origine de QuickEatery, mais qui avait \u00e9t\u00e9 manipul\u00e9 par des assaillants. Les identifiants saisis y \u00e9taient transmis directement aux acteurs malveillants. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4cd77b0 e-flex e-con-boxed e-con e-parent\" data-id=\"4cd77b0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-db259ac e-con-full e-flex e-con e-child\" data-id=\"db259ac\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c698d50 e-con-full e-flex e-con e-child\" data-id=\"c698d50\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c00403d elementor-widget elementor-widget-heading\" data-id=\"c00403d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">T\u00e9l\u00e9chargez l\u2019\u00e9tude de cas pour en apprendre davantage :\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26b0922 elementor-widget elementor-widget-text-editor\" data-id=\"26b0922\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul class=\"List List--checkmark\"><li>Comment les assaillants ont-ils pu tromper leurs victimes ?<\/li><li>Quelles sont les cons\u00e9quences d\u2019attaques de ce type ?<\/li><li>Comment les entreprises peuvent pr\u00e9venir ces attaques !<\/li><li> <\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-626d01e e-con-full e-flex e-con e-child\" data-id=\"626d01e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f6a7820 e-con-full e-flex e-con e-child\" data-id=\"f6a7820\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-072ed64 elementor-widget elementor-widget-html\" data-id=\"072ed64\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<iframe style=\"display: block; margin-left: auto; margin-right: auto; max-width: 100%;\" src=\"https:\/\/8cd7d579.sibforms.com\/serve\/MUIFAEvcoC64soriczNQscjY1aRxkAuwVqd7Z33Rjj8IJN54iDMiOq6YI7VkkXyDENMRGT9caSYHjywYCuxevSnMXIk7SocDiQN4u-FWfCJvf1c7fmbRqfvROW1gmung1K6zZAg40lxK1nCWA8wKYMLSYDkFSN7Vs30rPjMFfnKp9O0cuGNa9Y1syA3rHhARv2h4VS2LJzB8MRP5\" width=\"540\" height=\"720\" frameborder=\"0\" scrolling=\"auto\" allowfullscreen=\"allowfullscreen\"><\/iframe>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b84d216 e-flex e-con-boxed e-con e-parent\" data-id=\"b84d216\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b869a7a elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"b869a7a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Un restaurant a \u00e9t\u00e9 inform\u00e9 d\u2019un incident de s\u00e9curit\u00e9 informatique chez un fournisseur de logiciels utilis\u00e9 dont la plateforme est utilis\u00e9e pour la commande, l\u2019administration et les paiements. Les attaquants ont obtenu un acc\u00e8s non autoris\u00e9 \u00e0 des donn\u00e9es personnelles de clients, y compris des noms, des adresses e-mail et, dans certains cas, des informations de carte bancaire. Le d\u00e9clencheur \u00e9tait la faute d\u2019une employ\u00e9e comptable externe qui avait accidentellement saisi ses donn\u00e9es d\u2019acc\u00e8s sur une fausse page de connexion qui ressemblait de fa\u00e7on trompeuse \u00e0 la plateforme d\u2019origine.  <\/p>\n","protected":false},"author":3,"featured_media":28150,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[68],"tags":[],"class_list":["post-28151","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-etudes-de-cas"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>En r\u00e9sum\u00e9 : un incident de s\u00e9curit\u00e9 informatique sur trois coins - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/fr\/en-resume-un-incident-de-securite-informatique-sur-trois-coins\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"En r\u00e9sum\u00e9 : un incident de s\u00e9curit\u00e9 informatique sur trois coins - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Un restaurant a \u00e9t\u00e9 inform\u00e9 d\u2019un incident de s\u00e9curit\u00e9 informatique chez un fournisseur de logiciels utilis\u00e9 dont la plateforme est utilis\u00e9e pour la commande, l\u2019administration et les paiements. Les attaquants ont obtenu un acc\u00e8s non autoris\u00e9 \u00e0 des donn\u00e9es personnelles de clients, y compris des noms, des adresses e-mail et, dans certains cas, des informations de carte bancaire. Le d\u00e9clencheur \u00e9tait la faute d\u2019une employ\u00e9e comptable externe qui avait accidentellement saisi ses donn\u00e9es d\u2019acc\u00e8s sur une fausse page de connexion qui ressemblait de fa\u00e7on trompeuse \u00e0 la plateforme d\u2019origine.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/fr\/en-resume-un-incident-de-securite-informatique-sur-trois-coins\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-06T16:26:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-31T12:38:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/registration-3938434_1280-600x400-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/en-resume-un-incident-de-securite-informatique-sur-trois-coins\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/en-resume-un-incident-de-securite-informatique-sur-trois-coins\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"En r\u00e9sum\u00e9 : un incident de s\u00e9curit\u00e9 informatique sur trois coins\",\"datePublished\":\"2025-03-06T16:26:00+00:00\",\"dateModified\":\"2026-03-31T12:38:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/en-resume-un-incident-de-securite-informatique-sur-trois-coins\\\/\"},\"wordCount\":462,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/en-resume-un-incident-de-securite-informatique-sur-trois-coins\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/registration-3938434_1280-600x400-1.jpg\",\"articleSection\":[\"\u00c9tudes de cas\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/en-resume-un-incident-de-securite-informatique-sur-trois-coins\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/en-resume-un-incident-de-securite-informatique-sur-trois-coins\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/en-resume-un-incident-de-securite-informatique-sur-trois-coins\\\/\",\"name\":\"En r\u00e9sum\u00e9 : un incident de s\u00e9curit\u00e9 informatique sur trois coins - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/en-resume-un-incident-de-securite-informatique-sur-trois-coins\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/en-resume-un-incident-de-securite-informatique-sur-trois-coins\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/registration-3938434_1280-600x400-1.jpg\",\"datePublished\":\"2025-03-06T16:26:00+00:00\",\"dateModified\":\"2026-03-31T12:38:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/en-resume-un-incident-de-securite-informatique-sur-trois-coins\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/en-resume-un-incident-de-securite-informatique-sur-trois-coins\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/en-resume-un-incident-de-securite-informatique-sur-trois-coins\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/registration-3938434_1280-600x400-1.jpg\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/registration-3938434_1280-600x400-1.jpg\",\"width\":600,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/en-resume-un-incident-de-securite-informatique-sur-trois-coins\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"En r\u00e9sum\u00e9 : un incident de s\u00e9curit\u00e9 informatique sur trois coins\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"En r\u00e9sum\u00e9 : un incident de s\u00e9curit\u00e9 informatique sur trois coins - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/fr\/en-resume-un-incident-de-securite-informatique-sur-trois-coins\/","og_locale":"fr_FR","og_type":"article","og_title":"En r\u00e9sum\u00e9 : un incident de s\u00e9curit\u00e9 informatique sur trois coins - Perseus Technologies","og_description":"Un restaurant a \u00e9t\u00e9 inform\u00e9 d\u2019un incident de s\u00e9curit\u00e9 informatique chez un fournisseur de logiciels utilis\u00e9 dont la plateforme est utilis\u00e9e pour la commande, l\u2019administration et les paiements. Les attaquants ont obtenu un acc\u00e8s non autoris\u00e9 \u00e0 des donn\u00e9es personnelles de clients, y compris des noms, des adresses e-mail et, dans certains cas, des informations de carte bancaire. Le d\u00e9clencheur \u00e9tait la faute d\u2019une employ\u00e9e comptable externe qui avait accidentellement saisi ses donn\u00e9es d\u2019acc\u00e8s sur une fausse page de connexion qui ressemblait de fa\u00e7on trompeuse \u00e0 la plateforme d\u2019origine.","og_url":"https:\/\/perseus.de\/fr\/en-resume-un-incident-de-securite-informatique-sur-trois-coins\/","og_site_name":"Perseus Technologies","article_published_time":"2025-03-06T16:26:00+00:00","article_modified_time":"2026-03-31T12:38:16+00:00","og_image":[{"width":600,"height":400,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/registration-3938434_1280-600x400-1.jpg","type":"image\/jpeg"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Xenia Silbe","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/fr\/en-resume-un-incident-de-securite-informatique-sur-trois-coins\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/fr\/en-resume-un-incident-de-securite-informatique-sur-trois-coins\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"En r\u00e9sum\u00e9 : un incident de s\u00e9curit\u00e9 informatique sur trois coins","datePublished":"2025-03-06T16:26:00+00:00","dateModified":"2026-03-31T12:38:16+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/fr\/en-resume-un-incident-de-securite-informatique-sur-trois-coins\/"},"wordCount":462,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/fr\/en-resume-un-incident-de-securite-informatique-sur-trois-coins\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/registration-3938434_1280-600x400-1.jpg","articleSection":["\u00c9tudes de cas"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/fr\/en-resume-un-incident-de-securite-informatique-sur-trois-coins\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/fr\/en-resume-un-incident-de-securite-informatique-sur-trois-coins\/","url":"https:\/\/perseus.de\/fr\/en-resume-un-incident-de-securite-informatique-sur-trois-coins\/","name":"En r\u00e9sum\u00e9 : un incident de s\u00e9curit\u00e9 informatique sur trois coins - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/fr\/en-resume-un-incident-de-securite-informatique-sur-trois-coins\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/fr\/en-resume-un-incident-de-securite-informatique-sur-trois-coins\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/registration-3938434_1280-600x400-1.jpg","datePublished":"2025-03-06T16:26:00+00:00","dateModified":"2026-03-31T12:38:16+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/fr\/en-resume-un-incident-de-securite-informatique-sur-trois-coins\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/fr\/en-resume-un-incident-de-securite-informatique-sur-trois-coins\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/fr\/en-resume-un-incident-de-securite-informatique-sur-trois-coins\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/registration-3938434_1280-600x400-1.jpg","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/registration-3938434_1280-600x400-1.jpg","width":600,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/fr\/en-resume-un-incident-de-securite-informatique-sur-trois-coins\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"En r\u00e9sum\u00e9 : un incident de s\u00e9curit\u00e9 informatique sur trois coins"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/fr\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/28151","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/comments?post=28151"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/28151\/revisions"}],"predecessor-version":[{"id":28152,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/28151\/revisions\/28152"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media\/28150"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media?parent=28151"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/categories?post=28151"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/tags?post=28151"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}