{"id":2860,"date":"2013-03-23T08:00:00","date_gmt":"2013-03-23T08:00:00","guid":{"rendered":"http:\/\/fr.le-vpn.net\/le-marche-russe-du-phishing\/"},"modified":"2016-09-28T10:57:42","modified_gmt":"2016-09-28T08:57:42","slug":"le-marche-russe-du-phishing","status":"publish","type":"post","link":"https:\/\/www.le-vpn.com\/fr\/le-marche-russe-du-phishing\/","title":{"rendered":"Le march\u00e9 Russe du phishing"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><div dir=\"ltr\">\n<div><a href=\"https:\/\/4.bp.blogspot.com\/-IyPkqcn4Aqs\/UUXLZV6aN0I\/AAAAAAAAASM\/xd1ROTVknm8\/s1600\/Gone+Phishing.jpg\"><img decoding=\"async\" class=\" alignleft\" src=\"https:\/\/4.bp.blogspot.com\/-IyPkqcn4Aqs\/UUXLZV6aN0I\/AAAAAAAAASM\/xd1ROTVknm8\/s1600\/Gone+Phishing.jpg\" alt=\"\" border=\"0\" \/><\/a><\/div>\n<p>La Russie repr\u00e9sente certainement l&#8217;un des march\u00e9s du phishing les plus actifs : des cyber- pirates peuvent y concevoir toutes les escroqueries les plus sophistiqu\u00e9es et les outils n\u00e9cessaires pour organiser des cyber-attaques.<\/p>\n<p>Des recherches r\u00e9centes ont d\u00e9voil\u00e9 comment ce march\u00e9 bien organis\u00e9, en particulier concernant le phishing ou hame\u00e7onnage.<\/p>\n<p>Un chercheur a d\u00e9couvert un march\u00e9 publicitaire clandestin qui offre un acc\u00e8s aux donn\u00e9es sensibles d\u2019individus, en augmentant les taux de clics dans le cadre d\u2019une campagne de phishing, qui montre une grande connaissance des demandes du client: les e-mails de spams incluaient des donn\u00e9es utiles telles que les segments de march\u00e9, les donn\u00e9es g\u00e9ographiques et de contacts de l&#8217;entreprise, tels que fax, num\u00e9ro de t\u00e9l\u00e9phone et e-mail.<\/p>\n<p>Certaines entreprises de s\u00e9curit\u00e9 ont suivi la fa\u00e7on dont ces criminels collectent ces informations : ils ont pu construire d\u2019\u00e9normes bases de donn\u00e9es, en ciblant des secteurs sp\u00e9cifiques et acqu\u00e9rir des informations \u00e0 utiliser pour les grandes campagnes de phishing.<\/p>\n<p>Les logiciels malveillants repr\u00e9sentent certainement\u00a0le type d\u2019actions des cybercriminels le plus invasif et le plus dangereux. Il est en effet tr\u00e8s facile de diffuser des codes malveillants par le biais de r\u00e9seaux d&#8217;ordinateurs ou de syst\u00e8mes mobiles pour voler toutes sortes de donn\u00e9es sur les victimes. Sur le march\u00e9 de la cybercriminalit\u00e9, de nombreux prestataires offrent tout ce qu&#8217;il faut pour propager des programmes malveillants \u00e0 grande audience, \u00e0 un prix tr\u00e8s acessible.<\/p>\n<p>Les chercheurs ont \u00e9galement observ\u00e9 une tendance croissante du cyber-crime \u00ab fait-maison \u00bb avec des cybercriminels d\u00e9butants qui essaient de gagner de l\u2019argent, gr\u00e2ce \u00e0 des activit\u00e9s ill\u00e9gales d&#8217;externalisation de services et l&#8217;achat d&#8217;outils et d&#8217;informations.<\/p>\n<p>Il y a aussi un certain type de syst\u00e8me \u00e9conomique en C2C (de cybercriminel \u00e0 cybercriminel), se r\u00e9f\u00e9rant \u00e0 des groupes de cybercriminels qui \u00e9changent ou louent leurs services illicites avec des soi-disant coll\u00e8gues pour d\u00e9velopper leurs activit\u00e9s plus rapidement &#8230; Les experts en hame\u00e7onnage agissent sur le long terme, pour pouvoir recueillir d\u2019\u00e9normes quantit\u00e9s de donn\u00e9es en s\u2019int\u00e9ressant \u00e0 des secteurs sp\u00e9cifiques, de mani\u00e8re \u00e0 \u00e9largir leur collecte de donn\u00e9es pour les vendre.<\/p>\n<p>Pour \u00e9viter d\u2019\u00eatre une victime d\u2019une campagne de phishing, soyez prudents lors de la r\u00e9ception d&#8217;emails d\u2019\u00e9metteurs inconnus ou de messages qui apparaissent \u00e0 l&#8217;origine l\u00e9gitime, mais vous offrent &#8220;quelque chose&#8221; que vous n&#8217;avez pas demand\u00e9 et demandent des informations sur vous.<\/p>\n<p>Gr\u00e2ce aux services de <a href=\"http:\/\/www.le-vpn.com\/fr\/\">Le VPN<\/a>, vous pouvez consid\u00e9rablement augmenter votre s\u00e9curit\u00e9 en ligne. Votre connexion Internet est crypt\u00e9e avec un niveau top secret qui vous prot\u00e8ge contre les pirates et ceux qui essaient d\u2019acc\u00e9der \u00e0 vos informations sensibles.<\/p>\n<p>Votre ordinateur est cach\u00e9 derri\u00e8re des <a href=\"http:\/\/www.le-vpn.com\/fr\/serveurs\">serveurs<\/a> VPN : toute action malveillante externe, telles que les attaques de virus de r\u00e9seau sont ainsi repouss\u00e9es par les serveurs. Et lorsque vous \u00eates connect\u00e9s au VPN, personne ne peut acc\u00e9der \u00e0 votre ordinateur sans passer par les serveurs VPN s\u00e9curis\u00e9s.<\/p>\n<p>Le VPN vous aide \u00e0 rester anonyme en surfant sur le Web. Et il implique que tout le trafic est r\u00e9achemin\u00e9 via les r\u00e9seaux VPN prot\u00e9g\u00e9s, ce qui prot\u00e8ge l&#8217;ensemble de vos logiciels et appareils fonctionnant sur votre r\u00e9seau.<\/p>\n<\/div>\n[vc_row][vc_column]<div class=\"templatera_shortcode\"><div class=\"vc_row wpb_row vc_row-fluid mpc-row\"><div class=\"wpb_column vc_column_container vc_col-sm-12 mpc-column\" data-column-id=\"mpc_column-866a1175a6f4001\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div data-id=\"mpc_callout-636a1175a6f2977\" class=\"mpc-callout mpc-init mpc-callout--style_1 \"><div class=\"mpc-callout__icon-wrap mpc-icon--image\"><div class=\"mpc-callout__icon\"><i class=\"mpc-transition \"><img decoding=\"async\" class=\"\" src=\"https:\/\/www.le-vpn.com\/fr\/wp-content\/uploads\/2025\/09\/exclusive-deal.png\" width=\"100\" height=\"100\" alt=\"exclusive-deal\" title=\"exclusive-deal\" loading=\"lazy\"><\/i><\/div><\/div><div class=\"mpc-callout__content\"><h3 class=\"mpc-callout__heading mpc-typography--preset_1\">OFFRE EXCLUSIVE<\/h3><div data-id=\"mpc_divider-196a1175a6f29f4\" class=\"mpc-divider-wrap\"><div class=\"mpc-divider mpc-init mpc-align--center mpc-disable--left \"><div class=\"mpc-divider__line mpc-side--left\"><span><\/span><\/div><div class=\"mpc-divider__line mpc-side--right\"><span><\/span><\/div><\/div><\/div><div class=\"mpc-callout__description\"><p>LES 3 PREMI&Egrave;RES ANN&Eacute;ES &Agrave; 2,22 &euro;\/MOIS<\/p>\n<\/div><\/div><div class=\"mpc-callout__button\"><a href=\"https:\/\/www.le-vpn.com\/fr\/acheter-le-vpn\/\" title=\"\" data-id=\"mpc_button-886a1175a6f29c7\" class=\"mpc-button mpc-init mpc-transition mpc-typography--preset_2 \"><div class=\"mpc-button__content mpc-effect-type--none mpc-effect-side--none\"><span class=\"mpc-button__title mpc-transition\">PROFITEZ EN<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--fade mpc-effect-side--in\"><\/div><\/a><\/div><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid vc_custom_1725366294400 mpc-row\"><div class=\"wpb_column vc_column_container vc_col-sm-3 mpc-column\" data-column-id=\"mpc_column-896a1175a6f31f9\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1619036137534\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>PAS DE JOURNAL<\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1699541136156\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>100+ LOCALISATIONS<\/p>\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-3 mpc-column\" data-column-id=\"mpc_column-776a1175a6f34fd\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1619036153466\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;text-transform: uppercase;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>P2P autoris&eacute;<\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1619036161279\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;text-transform: uppercase;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>Facile &agrave; utiliser<\/p>\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-3 mpc-column\" data-column-id=\"mpc_column-716a1175a6f37ab\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1622661737627\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:13px;color:#444;text-transform: uppercase;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>Garantie de 30 Jours<\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1619036177713\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;text-transform: uppercase;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>Assistance amicale<\/p>\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-3 mpc-column\" data-column-id=\"mpc_column-106a1175a6f3a4f\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1619036185445\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;text-transform: uppercase;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>Bitcoin accept&eacute;<\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1619036194514\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;text-transform: uppercase;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>Vitesse de l'&eacute;clair<\/p>\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1701699917169 mpc-row\"><div class=\"wpb_column vc_column_container vc_col-sm-12 mpc-column\" data-column-id=\"mpc_column-536a1175a7004f1\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><\/div>\r\n<\/div>[\/vc_column][\/vc_row]<\/div>","protected":false},"excerpt":{"rendered":"<p>La Russie repr\u00e9sente certainement l&#8217;un des march\u00e9s du phishing les plus actifs : des cyber- pirates peuvent y concevoir toutes les escroqueries les plus sophistiqu\u00e9es et les outils n\u00e9cessaires pour organiser des cyber-attaques. Des recherches r\u00e9centes ont d\u00e9voil\u00e9 comment ce march\u00e9 bien organis\u00e9, en particulier concernant le phishing ou hame\u00e7onnage. Un chercheur a d\u00e9couvert un<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_yoast_wpseo_metadesc":"La Russie repr\u00e9sente l'un des march\u00e9s du phishing les plus actifs et peuvent concevoir les escroqueries les plus sophistiqu\u00e9es","footnotes":""},"categories":[833],"tags":[35,119],"yst_prominent_words":[],"class_list":["post-2860","post","type-post","status-publish","format-standard","hentry","category-blog_old","tag-cybercrime-2","tag-phishing"],"_links":{"self":[{"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/posts\/2860","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/comments?post=2860"}],"version-history":[{"count":4,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/posts\/2860\/revisions"}],"predecessor-version":[{"id":9317,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/posts\/2860\/revisions\/9317"}],"wp:attachment":[{"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/media?parent=2860"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/categories?post=2860"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/tags?post=2860"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/yst_prominent_words?post=2860"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}