{"id":2889,"date":"2013-01-24T07:32:00","date_gmt":"2013-01-24T07:32:00","guid":{"rendered":"http:\/\/fr.le-vpn.net\/2012-un-panorama-de-la-cybercriminalite-plus-quinquietant\/"},"modified":"2019-08-16T15:10:08","modified_gmt":"2019-08-16T13:10:08","slug":"2012-un-panorama-de-la-cybercriminalite","status":"publish","type":"post","link":"https:\/\/www.le-vpn.com\/fr\/2012-un-panorama-de-la-cybercriminalite\/","title":{"rendered":"2012, un panorama de la cybercriminalit\u00e9 plus qu\u2019inqui\u00e9tant"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><div dir=\"ltr\">\n<div><\/div>\n<p>Le Club de la S\u00e9curit\u00e9 Informatique en France (CLUSIF) a pr\u00e9sent\u00e9 son panorama 2012 de la cybercriminalit\u00e9 le 17 janvier : l\u2019ann\u00e9e derni\u00e8re a ainsi \u00e9t\u00e9 marqu\u00e9e par des attaques de plus en plus vari\u00e9es et par la \u201ccyber guerre\u201d.<\/p>\n<p>En 2011, le CLUSIF avait identifi\u00e9 l&#8217;\u00e9mergence de menaces concernant les t\u00e9l\u00e9phones mobiles qui ont \u00e9t\u00e9 confirm\u00e9es : les envois de SMS surtax\u00e9s par des botnets sur mobiles sont ainsi devenus tr\u00e8s \u00e0 la mode. Et tous les syst\u00e8mes d&#8217;exploitation de mobiles sont concern\u00e9s par ce type d\u2019arnaque.<\/p>\n<p>2012 fut d\u2019abord l&#8217;ann\u00e9e o\u00f9 les cyberconflits se sont formalis\u00e9s : l\u2019Iran a ainsi d\u00e9velopp\u00e9 son approche militaire pour lutter contre la cybercriminalit\u00e9, la France comme le Br\u00e9sil ont d\u00e9fini une doctrine purement d\u00e9fensive alors que les Etats-Unis assument une d\u00e9marche clairement offensive. D\u00e9sormais, les hacktivistes comme les \u00e9tats sont en guerre dans le cyberespace. Et des attaques pr\u00e9ventives par la CLUSIF sont \u00e9galement envisag\u00e9es.<\/p>\n<p>Par ailleurs, des attaques et des op\u00e9rations d&#8217;infiltrations ont \u00e9t\u00e9 men\u00e9es par le gouvernement syrien contre des opposants. Certains auraient m\u00eame \u00e9t\u00e9 tortur\u00e9s pour r\u00e9v\u00e9ler leurs codes d\u2019acc\u00e8s \u00e0 leur PC afin de laisser les forces de s\u00e9curit\u00e9 de la dictature int\u00e9grer leur r\u00e9seau.<\/p>\n<p>Les conflits se sont aussi d\u00e9mat\u00e9rialis\u00e9s avec des attaques cibl\u00e9es comme celles qui ont frapp\u00e9 les organes dirigeants de G\u00e9orgie ou de France. De nombreuses attaques ont touch\u00e9 des entreprises. Plusieurs \u00e9tats, y compris des \u00e9tats de l\u2019occident se voient ainsi accus\u00e9s de cyberattaque. Mais la v\u00e9rification d&#8217;une revendication est compliqu\u00e9e, vu qu\u2019il faut croiser les relations entre les groupes de pirates ou identifier les serveurs de contr\u00f4le partag\u00e9s.<\/p>\n<p>Cela n&#8217;emp\u00eache pas les cybercriminels de d\u00e9velopper des botnets de plus en plus sophistiqu\u00e9s : les ransomwares &#8211; ces malwares qui bloquent les ordinateurs ou t\u00e9l\u00e9phones mobiles jusqu&#8217;au paiement d&#8217;une ran\u00e7on reviennent ainsi sur le devant de la sc\u00e8ne. De plus, partager un syst\u00e8me d&#8217;exploitation entre PC, tablette et smartphone (Andro\u00efd, Windows 8&#8230;) renforce le risque. Le hacking est aussi un business florissant avec des cybercriminels qui vendent leurs comp\u00e9tences en attaque, avec m\u00eame parfois des services d&#8217;assistance et des garanties.<\/p>\n<p>Les attaques op\u00e9r\u00e9es ont des objectifs vari\u00e9s, comme l\u2019extorsion de fonds, l\u2019hactivisme et le cyberterrorisme. Les modes op\u00e9ratoires sont vari\u00e9s : de l&#8217;attaque de fishing cibl\u00e9e \u00e0 la pi\u00e8ce jointe corrompue en passant par l&#8217;injection d\u2019un code malicieux dans un site Internet.<\/p>\n<p>Pour \u00e9viter de rencontrer ces probl\u00e8mes, optez d\u00e8s aujourd\u2019hui pour <a href=\"https:\/\/www.le-vpn.com\/fr\/\" target=\"_blank\" rel=\"noopener noreferrer\">un Vpn<\/a>. Gr\u00e2ce \u00e0 sa technologie, le VPN qui signifie Virtual Private Network (soit en fran\u00e7ais R\u00e9seau Priv\u00e9 Virtuel) vous permet d&#8217;\u00e9tablir un tunnel VPN crypt\u00e9 vers un h\u00f4te (ou serveur) sur internet. Ainsi, vous <a href=\"https:\/\/www.le-vpn.com\/fr\/surfez-anonymement\/\" target=\"_blank\" rel=\"noopener noreferrer\">surfez anonymement<\/a>, sans restriction, il est impossible pour autrui d&#8217;intercepter votre trafic en raison du serveur VPN. Votre activit\u00e9 sur Internet est donc ind\u00e9tectable. Apr\u00e8s l\u2019activation de votre VPN, votre adresse IP est automatiquement remplac\u00e9e par une adresse IP du pays dans lequel se trouve votre serveur.<\/p>\n<p>Cela rend presque impossible le fait de suivre votre position et vous aide \u00e0 r\u00e9duire vos traces en ligne.<\/p>\n<\/div>\n[vc_row][vc_column]<div class=\"templatera_shortcode\"><div class=\"vc_row wpb_row vc_row-fluid mpc-row\"><div class=\"wpb_column vc_column_container vc_col-sm-12 mpc-column\" data-column-id=\"mpc_column-1269f4db6a56261\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div data-id=\"mpc_callout-2469f4db6a54c07\" class=\"mpc-callout mpc-init mpc-callout--style_1 \"><div class=\"mpc-callout__icon-wrap mpc-icon--image\"><div class=\"mpc-callout__icon\"><i class=\"mpc-transition \"><img decoding=\"async\" class=\"\" src=\"https:\/\/www.le-vpn.com\/fr\/wp-content\/uploads\/2025\/09\/exclusive-deal.png\" width=\"100\" height=\"100\" alt=\"exclusive-deal\" title=\"exclusive-deal\" loading=\"lazy\"><\/i><\/div><\/div><div class=\"mpc-callout__content\"><h3 class=\"mpc-callout__heading mpc-typography--preset_1\">OFFRE EXCLUSIVE<\/h3><div data-id=\"mpc_divider-3069f4db6a54c8c\" class=\"mpc-divider-wrap\"><div class=\"mpc-divider mpc-init mpc-align--center mpc-disable--left \"><div class=\"mpc-divider__line mpc-side--left\"><span><\/span><\/div><div class=\"mpc-divider__line mpc-side--right\"><span><\/span><\/div><\/div><\/div><div class=\"mpc-callout__description\"><p>LES 3 PREMI&Egrave;RES ANN&Eacute;ES &Agrave; 2,22 &euro;\/MOIS<\/p>\n<\/div><\/div><div class=\"mpc-callout__button\"><a href=\"https:\/\/www.le-vpn.com\/fr\/acheter-le-vpn\/\" title=\"\" data-id=\"mpc_button-4369f4db6a54c57\" class=\"mpc-button mpc-init mpc-transition mpc-typography--preset_2 \"><div class=\"mpc-button__content mpc-effect-type--none mpc-effect-side--none\"><span class=\"mpc-button__title mpc-transition\">PROFITEZ EN<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--fade mpc-effect-side--in\"><\/div><\/a><\/div><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid vc_custom_1725366294400 mpc-row\"><div class=\"wpb_column vc_column_container vc_col-sm-3 mpc-column\" data-column-id=\"mpc_column-6469f4db6a55462\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1619036137534\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>PAS DE JOURNAL<\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1699541136156\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>100+ LOCALISATIONS<\/p>\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-3 mpc-column\" data-column-id=\"mpc_column-3869f4db6a55767\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1619036153466\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;text-transform: uppercase;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>P2P autoris&eacute;<\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1619036161279\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;text-transform: uppercase;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>Facile &agrave; utiliser<\/p>\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-3 mpc-column\" data-column-id=\"mpc_column-1569f4db6a55a47\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1622661737627\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:13px;color:#444;text-transform: uppercase;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>Garantie de 30 Jours<\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1619036177713\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;text-transform: uppercase;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>Assistance amicale<\/p>\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-3 mpc-column\" data-column-id=\"mpc_column-6269f4db6a55cde\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1619036185445\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;text-transform: uppercase;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>Bitcoin accept&eacute;<\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1619036194514\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;text-transform: uppercase;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>Vitesse de l'&eacute;clair<\/p>\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1701699917169 mpc-row\"><div class=\"wpb_column vc_column_container vc_col-sm-12 mpc-column\" data-column-id=\"mpc_column-7469f4db6a569aa\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><\/div>\r\n<\/div>[\/vc_column][\/vc_row]<\/div>","protected":false},"excerpt":{"rendered":"<p>Le Club de la S\u00e9curit\u00e9 Informatique en France (CLUSIF) a pr\u00e9sent\u00e9 son panorama 2012 de la cybercriminalit\u00e9 le 17 janvier : l\u2019ann\u00e9e derni\u00e8re a ainsi \u00e9t\u00e9 marqu\u00e9e par des attaques de plus en plus vari\u00e9es et par la \u201ccyber guerre\u201d. En 2011, le CLUSIF avait identifi\u00e9 l&#8217;\u00e9mergence de menaces concernant les t\u00e9l\u00e9phones mobiles qui ont<\/p>\n","protected":false},"author":10,"featured_media":32156,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_yoast_wpseo_metadesc":"L\u2019ann\u00e9e derni\u00e8re, le Club de la S\u00e9curit\u00e9 Informatique en France (CLUSIF) a pr\u00e9sent\u00e9 son panorama 2012 de la cybercriminalit\u00e9 le 17 janvier.","footnotes":""},"categories":[833],"tags":[35,251,143],"yst_prominent_words":[4586,1207,2569,7143,7139,2415,6122,7140,1881,7142,1078,7141,2296,3630,1594,1116,1252,4846,7138,1565],"class_list":["post-2889","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog_old","tag-cybercrime-2","tag-cybercriminalite","tag-hackers"],"_links":{"self":[{"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/posts\/2889","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/comments?post=2889"}],"version-history":[{"count":7,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/posts\/2889\/revisions"}],"predecessor-version":[{"id":32159,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/posts\/2889\/revisions\/32159"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/media\/32156"}],"wp:attachment":[{"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/media?parent=2889"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/categories?post=2889"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/tags?post=2889"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/yst_prominent_words?post=2889"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}