{"id":28164,"date":"2024-10-01T17:03:00","date_gmt":"2024-10-01T15:03:00","guid":{"rendered":"https:\/\/perseus.de\/en-focus-arnaque-quadruple-par-email-arnaque\/"},"modified":"2026-03-31T14:39:32","modified_gmt":"2026-03-31T12:39:32","slug":"en-focus-arnaque-quadruple-par-email-arnaque","status":"publish","type":"post","link":"https:\/\/perseus.de\/fr\/en-focus-arnaque-quadruple-par-email-arnaque\/","title":{"rendered":"En Focus : Arnaque quadruple par email Arnaque"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"28164\" class=\"elementor elementor-28164 elementor-23021\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba0588 e-flex e-con-boxed e-con e-parent\" data-id=\"2ba0588\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5424324 e-con-full e-flex e-con e-child\" data-id=\"5424324\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-30992b0 e-con-full e-flex e-con e-child\" data-id=\"30992b0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6493f26 e-con-full e-flex e-con e-child\" data-id=\"6493f26\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52d785d elementor-widget elementor-widget-heading\" data-id=\"52d785d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">En Focus : Arnaque quadruple par email Arnaque\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b2585ee elementor-widget elementor-widget-text-editor\" data-id=\"b2585ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em>Les cybercriminels se fient aux arnaques par email. Mais quiconque pense que les criminels n\u2019envoient que des tentatives de phishing maladroites avec des emails mal \u00e9crits et d\u00e9fectueux se trompe. Les criminels mettent parfois beaucoup d\u2019efforts dans la planification, la conception et l\u2019ex\u00e9cution de la fraude par email. Les experts de l\u2019\u00e9quipe de gestion des interventions en cas d\u2019incident ont constat\u00e9 une augmentation de ces attaques. Pour vous montrer \u00e0 quel point certaines de ces attaques sont sophistiqu\u00e9es, nous pr\u00e9sentons le cas suivant. Vous verrez les attaquants envoyer de faux e-mails, abuser des noms d\u2019entreprises connues pour leur arnaque, inventer des produits, cr\u00e9er de faux sites web, copier de vraies entreprises, et bien plus encore.     <\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6459d3d elementor-widget elementor-widget-image\" data-id=\"6459d3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"600\" height=\"295\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2024\/10\/pump-4659468_1280-600x295-1.png\" class=\"attachment-medium_large size-medium_large wp-image-28162\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2024\/10\/pump-4659468_1280-600x295-1.png 600w, https:\/\/perseus.de\/wp-content\/uploads\/2024\/10\/pump-4659468_1280-600x295-1-300x148.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Cr\u00e9dit image : Ioannis Karathanasis via Pixabay<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0912818 e-flex e-con-boxed e-con e-parent\" data-id=\"0912818\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8aa38b0 elementor-widget elementor-widget-text-editor\" data-id=\"8aa38b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4>Que s\u2019est-il pass\u00e9 ?<\/h4>\n<p>Une entreprise aurait \u00e9t\u00e9 contact\u00e9e par courriel depuis Unilever Pays-Bas, un grand groupe de biens de consommation. En r\u00e9alit\u00e9, cependant, il s\u2019agissait d\u2019une demande d\u2019un tiers inconnu pour un plus grand nombre d\u2019un type tr\u00e8s sp\u00e9cifique de pompe. Un appel d\u2019offres \u00e9tait joint \u00e0 l\u2019e-mail. Comme l\u2019entreprise ne disposait pas de ce type de pompe en stock, elle a cherch\u00e9 d\u2019autres fournisseurs et a trouv\u00e9 ce qu\u2019elle cherchait. L\u2019entreprise commanda les pompes aupr\u00e8s de ce fournisseur et envoya en m\u00eame temps une offre non contraignante \u00e0 ce qu\u2019elle consid\u00e9rait comme Unilever Pays-Bas.    <\/p>\n<p>Le fournisseur nous a imm\u00e9diatement confirm\u00e9 qu\u2019il pouvait livrer les pompes souhait\u00e9es. Cependant, il exigea le paiement int\u00e9gral des marchandises \u00e0 l\u2019avance. C\u2019\u00e9tait une somme \u00e0 cinq chiffres \u00e9lev\u00e9s. Comme le risque augmentait, l\u2019entreprise a demand\u00e9 une r\u00e9duction de 50 % de l\u2019apport tout en obtenant un vote de son partenaire financier pour v\u00e9rifier la l\u00e9gitimit\u00e9 du fournisseur. Le r\u00e9sultat fut positif. Malheureusement, cette analyse \u00e9tait erron\u00e9e.     <\/p>\n<p>Apr\u00e8s que la soci\u00e9t\u00e9 eut \u00e9galement obtenu d\u2019autres informations sur le fournisseur, le d\u00e9p\u00f4t d\u2019environ 26 000 \u20ac fut transf\u00e9r\u00e9. Apr\u00e8s avoir re\u00e7u cette somme, le fournisseur nous a de nouveau contact\u00e9s et a demand\u00e9 la somme totale, quel que soit l\u2019accord. L\u2019entreprise ne se conformait plus \u00e0 cette demande, car entre-temps elle r\u00e9alisait qu\u2019elle s\u2019\u00e9tait fait avoir par une arnaque.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e53c2f1 e-flex e-con-boxed e-con e-parent\" data-id=\"e53c2f1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-65ddef8 elementor-widget elementor-widget-heading\" data-id=\"65ddef8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Comment les assaillants ont-ils agi ?\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fb62d5b e-flex e-con-boxed e-con e-parent\" data-id=\"fb62d5b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-06ff9ce e-con-full e-flex e-con e-child\" data-id=\"06ff9ce\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2951957 elementor-widget elementor-widget-text-editor\" data-id=\"2951957\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Pour endormir les victimes dans un faux sentiment de s\u00e9curit\u00e9, une entreprise tr\u00e8s connue \u2013 en l\u2019occurrence une entreprise mondialement connue des biens de consommation \u2013 est utilis\u00e9e pour \u00e9tablir le contact. Le premier e-mail \u00e9tait une demande pour un produit, une pompe sp\u00e9cifique. Si vous cherchiez cette pompe sur Internet, vous avez rapidement trouv\u00e9 ce que vous cherchiez et vous \u00eates dirig\u00e9 vers un site web d\u2019entreprise tr\u00e8s authentique qui propose exactement ce produit. Mais la marque de la pompe, le num\u00e9ro de produit et la soci\u00e9t\u00e9 qui aurait suppos\u00e9ment poss\u00e9d\u00e9 ces pompes \u00e9taient fictifs ou faux. Les sites web des fournisseurs pr\u00e9sum\u00e9s, y compris le nom de l\u2019entreprise, le domaine et le logo, ont \u00e9galement \u00e9t\u00e9 cr\u00e9\u00e9s, enregistr\u00e9s et falsifi\u00e9s dans le but de fraude.     <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-88df65d elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"88df65d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"400\" height=\"290\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2024\/10\/Case-Study-Unilever-Fake-Company-400x290-1.png\" class=\"attachment-large size-large wp-image-28163\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2024\/10\/Case-Study-Unilever-Fake-Company-400x290-1.png 400w, https:\/\/perseus.de\/wp-content\/uploads\/2024\/10\/Case-Study-Unilever-Fake-Company-400x290-1-300x218.png 300w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-52b3657 e-flex e-con-boxed e-con e-parent\" data-id=\"52b3657\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c809314 elementor-widget elementor-widget-text-editor\" data-id=\"c809314\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4>Comment la fraude a-t-elle pu \u00eatre reconnue ?<\/h4>\n<p><\/p>\n<p>Dans ces cas, une prudence absolue est vraiment recommand\u00e9e. Parce que les fraudeurs agissent de mani\u00e8re tr\u00e8s professionnelle. Pour r\u00e9soudre l\u2019affaire, les experts m\u00e9dico-l\u00e9gaux de Perseus ont analys\u00e9 l\u2019ensemble de la communication entre la victime et les agresseurs et ont pu identifier des indices de fraude. Pour pouvoir reconna\u00eetre ces signes vous-m\u00eame, un \u0153il entra\u00een\u00e9 est n\u00e9cessaire.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f945541 e-flex e-con-boxed e-con e-parent\" data-id=\"f945541\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-83d95b2 e-con-full e-flex e-con e-child\" data-id=\"83d95b2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3d6f819 elementor-widget elementor-widget-text-editor\" data-id=\"3d6f819\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img decoding=\"async\" class=\"alignleft wp-image-23025 size-full\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2024\/10\/Case-Study-Unilever-Grafik-HP-1-400x260-1.png\" alt=\"\" width=\"400\" height=\"260\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2024\/10\/Case-Study-Unilever-Grafik-HP-1-400x260-1.png 400w, https:\/\/perseus.de\/wp-content\/uploads\/2024\/10\/Case-Study-Unilever-Grafik-HP-1-400x260-1-300x195.png 300w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><strong>Voici nos conseils :<\/strong><\/p>\n<ol>\n<li>Examinez attentivement le profil de l\u2019exp\u00e9diteur des e-mails. Le nom de l\u2019exp\u00e9diteur peut \u00eatre facilement manipul\u00e9. \u00c0 premi\u00e8re vue, on dirait que l\u2019e-mail provient d\u2019une entreprise r\u00e9put\u00e9e, comme Unilever. Cependant, l\u2019adresse de l\u2019exp\u00e9diteur ne correspond souvent pas au nom de l\u2019exp\u00e9diteur. M\u00eame de petits signes comme une lettre transpos\u00e9e ou un autre domaine \u00e0 la fin de l\u2019e-mail peuvent indiquer qu\u2019une fraude a eu lieu.    <\/li>\n<li>Soyez vigilant avec les salutations g\u00e9n\u00e9riques, non sp\u00e9cifiques \u00e0 chaque personne. Dans le cas pr\u00e9sent, par exemple, le(s) b\u00e9n\u00e9ficiaire(s) ont \u00e9t\u00e9 plac\u00e9s dans une \u00ab copie carbone \u00e0 l\u2019aveugle (BCC) \u00bb. La victime n\u2019a donc pas \u00e9t\u00e9 contact\u00e9e explicitement, mais l\u2019e-mail a probablement \u00e9t\u00e9 envoy\u00e9 \u00e0 plusieurs destinataires inconnus.  <\/li>\n<li>Examinez l\u2019adresse du destinataire. Les entreprises reconnues et r\u00e9put\u00e9es utilisent principalement des adresses e-mail simples. La communication d\u2019Unilever, par exemple, se fait via @unilever.com et non via @unileverbrasil.com ou @unilevernetherlands.com. Un autre signe qu\u2019il ne s\u2019agit pas d\u2019une demande s\u00e9rieuse.   <\/li>\n<li>L\u2019adresse IP utilis\u00e9e pour envoyer les e-mails peut \u00e9galement fournir des indications suppl\u00e9mentaires sur la possibilit\u00e9 qu\u2019une fraude ait eu lieu. Par exemple, en tra\u00e7ant l\u2019entreprise ou l\u2019organisation \u00e0 laquelle appartient la propri\u00e9t\u00e9 intellectuelle ou le pays d\u2019o\u00f9 les e-mails sont envoy\u00e9s. <\/li>\n<li>Analysez attentivement le site. Dans le cas pr\u00e9sent, les fraudeurs ont cr\u00e9\u00e9 une page d\u2019accueil o\u00f9 les pompes souhait\u00e9es \u00e9taient propos\u00e9es. Les criminels utilisaient le nom d\u2019une vraie entreprise et l\u2019adaptaient l\u00e9g\u00e8rement. Le nom de l\u2019entreprise se terminait par -tech. Les attaquants utilisent l\u2019extension -tec. Le logo ressemblait \u00e9trangement \u00e0 celui de la vraie entreprise, sauf qu\u2019ici aussi la fin a \u00e9t\u00e9 chang\u00e9e de -tech \u00e0 -tec.     <\/li>\n<li>Prenez contact avec une entreprise avec laquelle vous n\u2019avez aucune relation professionnelle personnelle et v\u00e9rifiez toujours sa l\u00e9gitimit\u00e9. C\u2019est particuli\u00e8rement vrai pour les transactions financi\u00e8res. <\/li>\n<\/ol>\n<p> <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-53ce9db e-flex e-con-boxed e-con e-parent\" data-id=\"53ce9db\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d219ff3 elementor-widget elementor-widget-text-editor\" data-id=\"d219ff3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4>Voici nos conseils aux entreprises victimes de fraudes !<\/h4>\n<ul>\n<li>Signalez l\u2019incident au point central de contact pour la cybercriminalit\u00e9 (ZAC) responsable dans votre \u00c9tat f\u00e9d\u00e9ral. De cette mani\u00e8re, les autorit\u00e9s \u00e9trang\u00e8res d\u2019enqu\u00eate peuvent apporter leur soutien si n\u00e9cessaire et le trajet de l\u2019argent peut \u00eatre retrac\u00e9.<br>Plainte p\u00e9nale \u00e0 la police. <\/li>\n<li>Formez vos employ\u00e9s et informez-les des menaces num\u00e9riques provenant d\u2019Internet.<br><strong>Conseil :<\/strong> <strong>Perseus vous propose un <a title=\"Portail en ligne sur la cybers\u00e9curit\u00e9\" href=\"https:\/\/perseus.de\/loesungen\/online-portal-fuer-cybersicherheit\/\">programme de pr\u00e9vention<\/a> durable comprenant des formations en ligne, des simulations de phishing, des alertes de danger et d\u2019autres conseils et outils utiles pour la vie quotidienne.<\/strong><\/li>\n<li>V\u00e9rifiez si l\u2019arnaque a affect\u00e9 d\u2019autres parties ou s\u2019il y a un risque que d\u2019autres personnes soient concern\u00e9es par l\u2019arnaque. Si c\u2019est le cas, contactez les organisations. <\/li>\n<li>\u00c9valuez l\u2019incident en d\u00e9tail et interrogez les processus et structures existants. Si vous trouvez des lacunes, comblez-les et optimisez vos processus m\u00e9tier. <br><strong>Conseil :<\/strong> <strong>Comptez sur le soutien externe d\u2019experts pour la mise en \u0153uvre. <a href=\"https:\/\/perseus.de\/loesungen\/cybernotfall-management\/\">Pers\u00e9e peut vous conseiller ici<\/a>.<\/strong><\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4cd77b0 e-flex e-con-boxed e-con e-parent\" data-id=\"4cd77b0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-db259ac e-con-full e-flex e-con e-child\" data-id=\"db259ac\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c698d50 e-con-full e-flex e-con e-child\" data-id=\"c698d50\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c00403d elementor-widget elementor-widget-heading\" data-id=\"c00403d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">T\u00e9l\u00e9chargez l\u2019\u00e9tude de cas pour en apprendre davantage :\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26b0922 elementor-widget elementor-widget-text-editor\" data-id=\"26b0922\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul class=\"List List--checkmark\">\n<li>Comment les assaillants ont-ils proc\u00e9d\u00e9 concr\u00e8tement ?<\/li>\n<li>Quelles ont \u00e9t\u00e9 les cons\u00e9quences pour les parties concern\u00e9es ?<\/li>\n<li>Quels conseils nos experts donnent-ils aux entreprises touch\u00e9es par ce type d\u2019attaques ?<\/li>\n<li>Quelles mesures devraient \u00eatre prises pour pr\u00e9venir ces attaques ?<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-626d01e e-con-full e-flex e-con e-child\" data-id=\"626d01e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f6a7820 e-con-full e-flex e-con e-child\" data-id=\"f6a7820\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-072ed64 elementor-widget elementor-widget-html\" data-id=\"072ed64\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<iframe style=\"display: block; margin-left: auto; margin-right: auto; max-width: 100%;\" src=\"https:\/\/8cd7d579.sibforms.com\/serve\/MUIFAKjh13Z_i-Lj4seXh5yJIRE2tN5LXhKD9xwb118DBgzLfr2FaP_xIcAp7WZTm431dzv_IEbFl1sI2TnWR5QaubZcOHtgmHJXQT_pF0u6BYCQrFYWGFa2a2U0N5CmVtvXCcwhhj49cG2qKHYfVwAD5SuGbElfc0n4sFPhywfHiSm_XZSR02l0Fsnjy4bVj3h0sk_uBIzATqpR\" width=\"540\" height=\"720\" frameborder=\"0\" scrolling=\"auto\" allowfullscreen=\"allowfullscreen\"><\/iframe>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-901d973 e-flex e-con-boxed e-con e-parent\" data-id=\"901d973\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-64e2e04 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"64e2e04\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Les cybercriminels se fient aux arnaques par email. Mais quiconque pense que les criminels n\u2019envoient que des tentatives de phishing maladroites avec des emails mal \u00e9crits et d\u00e9fectueux se trompe. Les criminels mettent parfois beaucoup d\u2019efforts dans la planification, la conception et l\u2019ex\u00e9cution de la fraude par email. Les experts de l\u2019\u00e9quipe de gestion des interventions en cas d\u2019incident ont constat\u00e9 une augmentation de ces attaques. Pour vous montrer \u00e0 quel point certaines de ces attaques sont sophistiqu\u00e9es, nous pr\u00e9sentons le cas suivant. Vous verrez les attaquants envoyer de faux e-mails, abuser des noms d\u2019entreprises connues pour leur arnaque, inventer des produits, cr\u00e9er de faux sites web, copier de vraies entreprises, et bien plus encore.     <\/p>\n","protected":false},"author":3,"featured_media":28162,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[68],"tags":[],"class_list":["post-28164","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-etudes-de-cas"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>En Focus : Arnaque quadruple par email Arnaque - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/fr\/en-focus-arnaque-quadruple-par-email-arnaque\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"En Focus : Arnaque quadruple par email Arnaque - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Les cybercriminels se fient aux arnaques par email. Mais quiconque pense que les criminels n\u2019envoient que des tentatives de phishing maladroites avec des emails mal \u00e9crits et d\u00e9fectueux se trompe. Les criminels mettent parfois beaucoup d\u2019efforts dans la planification, la conception et l\u2019ex\u00e9cution de la fraude par email. Les experts de l\u2019\u00e9quipe de gestion des interventions en cas d\u2019incident ont constat\u00e9 une augmentation de ces attaques. Pour vous montrer \u00e0 quel point certaines de ces attaques sont sophistiqu\u00e9es, nous pr\u00e9sentons le cas suivant. Vous verrez les attaquants envoyer de faux e-mails, abuser des noms d\u2019entreprises connues pour leur arnaque, inventer des produits, cr\u00e9er de faux sites web, copier de vraies entreprises, et bien plus encore.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/fr\/en-focus-arnaque-quadruple-par-email-arnaque\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-01T15:03:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-31T12:39:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2024\/10\/pump-4659468_1280-600x295-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"295\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/en-focus-arnaque-quadruple-par-email-arnaque\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/en-focus-arnaque-quadruple-par-email-arnaque\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"En Focus : Arnaque quadruple par email Arnaque\",\"datePublished\":\"2024-10-01T15:03:00+00:00\",\"dateModified\":\"2026-03-31T12:39:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/en-focus-arnaque-quadruple-par-email-arnaque\\\/\"},\"wordCount\":1221,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/en-focus-arnaque-quadruple-par-email-arnaque\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/pump-4659468_1280-600x295-1.png\",\"articleSection\":[\"\u00c9tudes de cas\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/en-focus-arnaque-quadruple-par-email-arnaque\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/en-focus-arnaque-quadruple-par-email-arnaque\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/en-focus-arnaque-quadruple-par-email-arnaque\\\/\",\"name\":\"En Focus : Arnaque quadruple par email Arnaque - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/en-focus-arnaque-quadruple-par-email-arnaque\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/en-focus-arnaque-quadruple-par-email-arnaque\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/pump-4659468_1280-600x295-1.png\",\"datePublished\":\"2024-10-01T15:03:00+00:00\",\"dateModified\":\"2026-03-31T12:39:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/en-focus-arnaque-quadruple-par-email-arnaque\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/en-focus-arnaque-quadruple-par-email-arnaque\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/en-focus-arnaque-quadruple-par-email-arnaque\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/pump-4659468_1280-600x295-1.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/pump-4659468_1280-600x295-1.png\",\"width\":600,\"height\":295},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/en-focus-arnaque-quadruple-par-email-arnaque\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"En Focus : Arnaque quadruple par email Arnaque\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"En Focus : Arnaque quadruple par email Arnaque - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/fr\/en-focus-arnaque-quadruple-par-email-arnaque\/","og_locale":"fr_FR","og_type":"article","og_title":"En Focus : Arnaque quadruple par email Arnaque - Perseus Technologies","og_description":"Les cybercriminels se fient aux arnaques par email. Mais quiconque pense que les criminels n\u2019envoient que des tentatives de phishing maladroites avec des emails mal \u00e9crits et d\u00e9fectueux se trompe. Les criminels mettent parfois beaucoup d\u2019efforts dans la planification, la conception et l\u2019ex\u00e9cution de la fraude par email. Les experts de l\u2019\u00e9quipe de gestion des interventions en cas d\u2019incident ont constat\u00e9 une augmentation de ces attaques. Pour vous montrer \u00e0 quel point certaines de ces attaques sont sophistiqu\u00e9es, nous pr\u00e9sentons le cas suivant. Vous verrez les attaquants envoyer de faux e-mails, abuser des noms d\u2019entreprises connues pour leur arnaque, inventer des produits, cr\u00e9er de faux sites web, copier de vraies entreprises, et bien plus encore.","og_url":"https:\/\/perseus.de\/fr\/en-focus-arnaque-quadruple-par-email-arnaque\/","og_site_name":"Perseus Technologies","article_published_time":"2024-10-01T15:03:00+00:00","article_modified_time":"2026-03-31T12:39:32+00:00","og_image":[{"width":600,"height":295,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2024\/10\/pump-4659468_1280-600x295-1.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Xenia Silbe","Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/fr\/en-focus-arnaque-quadruple-par-email-arnaque\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/fr\/en-focus-arnaque-quadruple-par-email-arnaque\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"En Focus : Arnaque quadruple par email Arnaque","datePublished":"2024-10-01T15:03:00+00:00","dateModified":"2026-03-31T12:39:32+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/fr\/en-focus-arnaque-quadruple-par-email-arnaque\/"},"wordCount":1221,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/fr\/en-focus-arnaque-quadruple-par-email-arnaque\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2024\/10\/pump-4659468_1280-600x295-1.png","articleSection":["\u00c9tudes de cas"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/fr\/en-focus-arnaque-quadruple-par-email-arnaque\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/fr\/en-focus-arnaque-quadruple-par-email-arnaque\/","url":"https:\/\/perseus.de\/fr\/en-focus-arnaque-quadruple-par-email-arnaque\/","name":"En Focus : Arnaque quadruple par email Arnaque - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/fr\/en-focus-arnaque-quadruple-par-email-arnaque\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/fr\/en-focus-arnaque-quadruple-par-email-arnaque\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2024\/10\/pump-4659468_1280-600x295-1.png","datePublished":"2024-10-01T15:03:00+00:00","dateModified":"2026-03-31T12:39:32+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/fr\/en-focus-arnaque-quadruple-par-email-arnaque\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/fr\/en-focus-arnaque-quadruple-par-email-arnaque\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/fr\/en-focus-arnaque-quadruple-par-email-arnaque\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2024\/10\/pump-4659468_1280-600x295-1.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2024\/10\/pump-4659468_1280-600x295-1.png","width":600,"height":295},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/fr\/en-focus-arnaque-quadruple-par-email-arnaque\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"En Focus : Arnaque quadruple par email Arnaque"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/fr\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/28164","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/comments?post=28164"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/28164\/revisions"}],"predecessor-version":[{"id":28165,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/28164\/revisions\/28165"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media\/28162"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media?parent=28164"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/categories?post=28164"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/tags?post=28164"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}