{"id":2879,"date":"2013-02-13T07:30:00","date_gmt":"2013-02-13T07:30:00","guid":{"rendered":"http:\/\/fr.le-vpn.net\/ce-que-deviennent-les-mots-de-passe-voles\/"},"modified":"2016-09-21T17:17:28","modified_gmt":"2016-09-21T15:17:28","slug":"ce-que-deviennent-les-mots-de-passe-voles","status":"publish","type":"post","link":"https:\/\/www.le-vpn.com\/fr\/ce-que-deviennent-les-mots-de-passe-voles\/","title":{"rendered":"Ce que deviennent les mots de passe vol\u00e9s"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><div dir=\"ltr\">\n<div><img decoding=\"async\" class=\"alignleft\" src=\"https:\/\/3.bp.blogspot.com\/-D7RqqOu7gqg\/UQoDOCpRpSI\/AAAAAAAAAM4\/uLtW212QrtM\/s320\/access.jpg\" width=\"320\" height=\"215\" border=\"0\" \/><\/div>\n<p>Il y a \u00e0 peine quelques ann\u00e9es, un ordinateur endommag\u00e9 par un virus en raison de logiciels malveillants aurait induit quelques utilisations frauduleuses, comme le spam ou l\u2019arr\u00eat sur certaines fonctionnalit\u00e9s. Mais de nos jours, les cybercriminels vont beaucoup plus loin avec les donn\u00e9es vol\u00e9es par des syst\u00e8mes pirat\u00e9s, notamment avec les mots de passe et identifiants e-mail associ\u00e9s.<\/p>\n<p>On a tout d\u2019abord les botnets, ces r\u00e9seaux d&#8217;ordinateurs infect\u00e9s ou zombies qui ob\u00e9issent \u00e0 une commande \u00e0 distance et au contr\u00f4le d\u2019une personne ext\u00e9rieure. Le terme est aussi utilis\u00e9 pour d\u00e9finir les virus botnet qui infectent les ordinateurs. Par d\u00e9faut, la plupart des logiciels malveillants vont extraire les mots de passe stock\u00e9s dans le navigateur de l&#8217;ordinateur de la victime, intercepter et enregistrer toutes les informations d&#8217;identification pr\u00e9sent\u00e9es dans les formulaires Web, par exemple lorsque l&#8217;utilisateur entre son num\u00e9ro de carte de cr\u00e9dit et son adresse sur un site de vente en ligne.<\/p>\n<p>Les donn\u00e9es les plus pr\u00e9cieuses extraites \u00e0 partir d&#8217;ordinateurs pirat\u00e9s sont les informations bancaires. Mais les donn\u00e9es non financi\u00e8res ont aussi de la valeur, en particulier pour des sites de hackers qui collectent et revendent ces informations.<\/p>\n<p>En effet, les donn\u00e9es de connexions pour des boutiques en ligne tr\u00e8s connues sont revendues &#8211; soit en vrac, soit s\u00e9par\u00e9ment par le nom du d\u00e9taillant &#8211; sur les forums criminels souterrains. Un cybercriminel qui exploite un r\u00e9seau de zombies Citadelle d&#8217;une certaine taille (quelques milliers de bots) peut esp\u00e9rer rassembler rapidement de grands volumes de donn\u00e9es de r\u00e9f\u00e9rence des utilisateurs et d&#8217;historique de navigation \u00e0 partir d&#8217;ordinateurs d\u00e9tourn\u00e9s.<\/p>\n<p>De plus en plus de cybercriminels proposent leur propre site de vente de donn\u00e9es vol\u00e9es pour des boutiques en ligne. Des comptes contenant des informations d&#8217;identification li\u00e9es \u00e0 une adresse e-mail peuvent ainsi rapporter quelques dollars.<\/p>\n<p>Presque tous les \u00e9l\u00e9ments d&#8217;un ordinateur pirat\u00e9 concernant la vie en ligne d&#8217;un utilisateur peuvent \u00eatre exploit\u00e9s \u00e0 des fins commerciales. Si un \u00e9l\u00e9ment a une valeur et ne peut \u00eatre revendu, alors il existe un service ou produit offert dans l\u2019espace cybercriminel pour le mon\u00e9tiser.<\/p>\n<p>Vous devez prot\u00e9ger votre ordinateur, tablette et smartphone, en ayant un antivirus solide. Utilisez \u00e9galement un service <a href=\"http:\/\/www.le-vpn.com\/fr\/\" target=\"_blank\">VPN<\/a>, pour ne pas \u00eatre le prochain sur la liste des affaires de cybercriminalit\u00e9. Une connexion VPN s\u00e9curise vos activit\u00e9s sur Internet, y compris les <a href=\"http:\/\/www.le-vpn.com\/fr\/telechargements-securises\" target=\"_blank\">t\u00e9l\u00e9chargements<\/a>, l&#8217;utilisation de Facebook et des m\u00e9dias en ligne. Sa technologie permet d&#8217;\u00e9tablir un tunnel VPN entre vous et les points d&#8217;acc\u00e8s au serveur VPN sur Internet. Ainsi, vous surfez <a href=\"http:\/\/www.le-vpn.com\/fr\/surfez-anonymement\" target=\"_blank\">anonymement<\/a>, sans restrictions, et il est impossible pour quiconque d&#8217;intercepter votre trafic lors de votre connexion s\u00e9curis\u00e9e \u00e0 un serveur VPN. Un VPN permet \u00e0 votre activit\u00e9 en ligne de ne pas \u00eatre d\u00e9tect\u00e9e. Votre vie priv\u00e9e reste ainsi aussi priv\u00e9e en ligne.<\/p>\n<\/div>\n[vc_row][vc_column]<div class=\"templatera_shortcode\"><div class=\"vc_row wpb_row vc_row-fluid mpc-row\"><div class=\"wpb_column vc_column_container vc_col-sm-12 mpc-column\" data-column-id=\"mpc_column-7669e46eb7dd682\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div data-id=\"mpc_callout-6269e46eb7dc00c\" class=\"mpc-callout mpc-init mpc-callout--style_1 \"><div class=\"mpc-callout__icon-wrap mpc-icon--image\"><div class=\"mpc-callout__icon\"><i class=\"mpc-transition \"><img decoding=\"async\" class=\"\" src=\"https:\/\/www.le-vpn.com\/fr\/wp-content\/uploads\/2025\/09\/exclusive-deal.png\" width=\"100\" height=\"100\" alt=\"exclusive-deal\" title=\"exclusive-deal\" loading=\"lazy\"><\/i><\/div><\/div><div class=\"mpc-callout__content\"><h3 class=\"mpc-callout__heading mpc-typography--preset_1\">OFFRE EXCLUSIVE<\/h3><div data-id=\"mpc_divider-2069e46eb7dc097\" class=\"mpc-divider-wrap\"><div class=\"mpc-divider mpc-init mpc-align--center mpc-disable--left \"><div class=\"mpc-divider__line mpc-side--left\"><span><\/span><\/div><div class=\"mpc-divider__line mpc-side--right\"><span><\/span><\/div><\/div><\/div><div class=\"mpc-callout__description\"><p>LES 3 PREMI&Egrave;RES ANN&Eacute;ES &Agrave; 2,22 &euro;\/MOIS<\/p>\n<\/div><\/div><div class=\"mpc-callout__button\"><a href=\"https:\/\/www.le-vpn.com\/fr\/acheter-le-vpn\/\" title=\"\" data-id=\"mpc_button-6169e46eb7dc065\" class=\"mpc-button mpc-init mpc-transition mpc-typography--preset_2 \"><div class=\"mpc-button__content mpc-effect-type--none mpc-effect-side--none\"><span class=\"mpc-button__title mpc-transition\">PROFITEZ EN<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--fade mpc-effect-side--in\"><\/div><\/a><\/div><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid vc_custom_1725366294400 mpc-row\"><div class=\"wpb_column vc_column_container vc_col-sm-3 mpc-column\" data-column-id=\"mpc_column-7269e46eb7dc85e\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1619036137534\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>PAS DE JOURNAL<\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1699541136156\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>100+ LOCALISATIONS<\/p>\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-3 mpc-column\" data-column-id=\"mpc_column-6869e46eb7dcb5f\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1619036153466\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;text-transform: uppercase;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>P2P autoris&eacute;<\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1619036161279\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;text-transform: uppercase;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>Facile &agrave; utiliser<\/p>\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-3 mpc-column\" data-column-id=\"mpc_column-6969e46eb7dce13\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1622661737627\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:13px;color:#444;text-transform: uppercase;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>Garantie de 30 Jours<\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1619036177713\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;text-transform: uppercase;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>Assistance amicale<\/p>\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-3 mpc-column\" data-column-id=\"mpc_column-1569e46eb7dd0b2\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1619036185445\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;text-transform: uppercase;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>Bitcoin accept&eacute;<\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1619036194514\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;text-transform: uppercase;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>Vitesse de l'&eacute;clair<\/p>\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1701699917169 mpc-row\"><div class=\"wpb_column vc_column_container vc_col-sm-12 mpc-column\" data-column-id=\"mpc_column-5069e46eb7dddad\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><\/div>\r\n<\/div>[\/vc_column][\/vc_row]<\/div>","protected":false},"excerpt":{"rendered":"<p>Il y a \u00e0 peine quelques ann\u00e9es, un ordinateur endommag\u00e9 par un virus en raison de logiciels malveillants aurait induit quelques utilisations frauduleuses, comme le spam ou l\u2019arr\u00eat sur certaines fonctionnalit\u00e9s. Mais de nos jours, les cybercriminels vont beaucoup plus loin avec les donn\u00e9es vol\u00e9es par des syst\u00e8mes pirat\u00e9s, notamment avec les mots de passe<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_yoast_wpseo_metadesc":"Les cybercriminels vont tres loin avec les donn\u00e9es vol\u00e9es, notamment avec les mots de passe et identifiants e-mail associ\u00e9s.","footnotes":""},"categories":[833],"tags":[35,251,248],"yst_prominent_words":[],"class_list":["post-2879","post","type-post","status-publish","format-standard","hentry","category-blog_old","tag-cybercrime-2","tag-cybercriminalite","tag-cybersecurite"],"_links":{"self":[{"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/posts\/2879","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/comments?post=2879"}],"version-history":[{"count":4,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/posts\/2879\/revisions"}],"predecessor-version":[{"id":9252,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/posts\/2879\/revisions\/9252"}],"wp:attachment":[{"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/media?parent=2879"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/categories?post=2879"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/tags?post=2879"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/yst_prominent_words?post=2879"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}