{"id":76996,"date":"2020-07-09T12:35:36","date_gmt":"2020-07-09T16:35:36","guid":{"rendered":"https:\/\/isarta.com\/infos\/?p=76996"},"modified":"2020-07-09T13:00:00","modified_gmt":"2020-07-09T17:00:00","slug":"comment-detecter-lhameconnage-par-sms","status":"publish","type":"post","link":"https:\/\/isarta.com\/infos\/comment-detecter-lhameconnage-par-sms\/","title":{"rendered":"Comment d\u00e9tecter l\u2019hame\u00e7onnage par SMS ?"},"content":{"rendered":"<div id=\"attachment_77005\" style=\"width: 702px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-77005\" loading=\"lazy\" class=\" wp-image-77005\" src=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2020\/07\/luke-porter-UGX2qdjdKkw-unsplash-300x200.jpg\" alt=\"\" width=\"692\" height=\"461\" srcset=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2020\/07\/luke-porter-UGX2qdjdKkw-unsplash-300x200.jpg 300w, https:\/\/isarta.com\/infos\/wp-content\/uploads\/2020\/07\/luke-porter-UGX2qdjdKkw-unsplash-768x512.jpg 768w, https:\/\/isarta.com\/infos\/wp-content\/uploads\/2020\/07\/luke-porter-UGX2qdjdKkw-unsplash-1024x683.jpg 1024w, https:\/\/isarta.com\/infos\/wp-content\/uploads\/2020\/07\/luke-porter-UGX2qdjdKkw-unsplash-272x182.jpg 272w\" sizes=\"(max-width: 692px) 100vw, 692px\" \/><\/p>\n<p id=\"caption-attachment-77005\" class=\"wp-caption-text\"><em><span style=\"font-size: 10px;\">Photo :\u00a0<a href=\"https:\/\/unsplash.com\/@lukeporter?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Luke Porter<\/a>\u00a0\/\u00a0<a href=\"https:\/\/unsplash.com\/s\/photos\/cellphone?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash<\/a><\/span><\/em><\/p>\n<\/div>\n<p><span style=\"font-size: 10px;\">7 juillet 2020<\/span><\/p>\n<p><span style=\"font-size: 20px;\"><strong>Les pirates informatiques <a href=\"https:\/\/www.tvanouvelles.ca\/2020\/04\/22\/google-met-en-garde-contre-lhameconnage-covid-19\" target=\"_blank\" rel=\"noopener\">n&rsquo;ont pas pris de pause pendant la COVID-19<\/a>, bien au contraire. L&rsquo;expert Simon Fontaine, pr\u00e9sident de <a href=\"https:\/\/www.ars-solutions.ca\/\" target=\"_blank\" rel=\"noopener\">ARS Solutions<\/a>\u00a0et auteur d&rsquo;un <a href=\"https:\/\/www.ars-solutions.ca\/cybersecurite-2020\/\" target=\"_blank\" rel=\"noopener\">rapport sur la cybercriminalit\u00e9<\/a>, d\u00e9crypte pour Isarta Infos les pratiques d&rsquo;hame\u00e7onnage par SMS.<\/strong><\/span><\/p>\n<p>Il existe plusieurs types d\u2019attaques par SMS tr\u00e8s courantes dans lesquelles les fraudeurs envoient des faux messages pour essayer de vous pousser \u00e0 d\u00e9voiler des informations personnelles ou pour infecter votre t\u00e9l\u00e9phone avec des logiciels malveillants.<\/p>\n<h2><span style=\"font-size: 24px;\"><strong>\u00c0 quoi faut-il faire attention?<\/strong><\/span><\/h2>\n<p>5000 ou d\u2019autres num\u00e9ros ne ressemblant pas \u00e0 des num\u00e9ros de portable sont la plupart du temps des fraudeurs cachant leur identit\u00e9, en utilisant une adresse courriel pour envoyer leurs messages SMS. Des sites Internet usurp\u00e9s sont le plus souvent une tentative des fraudeurs de masquer leur identit\u00e9, en utilisant des services d\u2019e-mail vers texte. Voici quelques exemples :<\/p>\n<blockquote><p><span style=\"font-size: 16px;\">5000 &#8211; Cher client Walmart, F\u00e9licitations, vous venez de gagner une carte cadeau Walmart de $1000 Cliquez ici pour r\u00e9clamer votre cadeau www.wmartlick.com (pour annuler : r\u00e9pondez STOP)\u00a0\u00bb<\/span><\/p><\/blockquote>\n<blockquote><p><span style=\"font-size: 16px;\">(405) 777-0909 Avertissement \u2013 Ceci est un message automatique de la coop\u00e9rative de cr\u00e9dit f\u00e9d\u00e9rale de l\u2019Universit\u00e9 de Miami, votre carte ATM XXX4 0505 a \u00e9t\u00e9 bloqu\u00e9e. Cliquez sur ce lien pour la r\u00e9activer : bitly.ru\u00a0\u00bb<\/span><\/p><\/blockquote>\n<p>Il s\u2019agit en g\u00e9n\u00e9ral de fraudeurs qui cachant leur identit\u00e9 en utilisant une adresse courriel pour envoyer des messages SMS, des num\u00e9ros inconnus ou des messages non sollicit\u00e9s. Les fraudeurs par SMS peuvent utiliser les quelques chiffres de votre carte de d\u00e9bit\/cr\u00e9dit pour vous mettre sous pression et vous forcer \u00e0 r\u00e9pondre.<\/p>\n<p>Vous devez contacter directement les banques, les institutions financi\u00e8res, les plateformes de m\u00e9dias sociaux, et d\u2019autres comptes commerciaux afin de confirmer s\u2019ils vous ont envoy\u00e9 une requ\u00eate l\u00e9gitime par SMS.<\/p>\n<h2><span style=\"font-size: 24px;\"><strong>Une fa\u00e7on d&rsquo;acc\u00e9der \u00e0 sa bo\u00eete courriel<\/strong><\/span><\/h2>\n<p>Les fraudeurs par sms ont m\u00eame r\u00e9ussi \u00e0 contourner la validation en 2 \u00e9tapes de Gmail, Hotmail et Yahoo Mail.<\/p>\n<ul>\n<li>1. Les assaillants mettent la main sur l\u2019adresse courriel ou le num\u00e9ro de t\u00e9l\u00e9phone de la victime \u00e0 partir de sources publiques.<\/li>\n<li>2. Les fraudeurs par SMS envoient des messages \u00e0 leur victime : \u00ab Google a d\u00e9tect\u00e9 une activit\u00e9 inhabituelle sur votre compte. Veuillez r\u00e9pondre imm\u00e9diatement avec le code envoy\u00e9 sur votre appareil mobile. \u00bb<\/li>\n<li>3. La victime envoie le code de v\u00e9rification de mot de passe au fraudeur, en pensant que la requ\u00eate provient de Google.<\/li>\n<li>4. L\u2019assaillant utilise le code pour r\u00e9initialiser le mot de passe de la victime et acc\u00e9der \u00e0 son compte.<\/li>\n<\/ul>\n<p>Vous voici pr\u00e9venu.es !<\/p>\n<div class=\"likebtn_container\" style=\"clear:both;text-align:center;\"><!-- LikeBtn.com BEGIN --><span class=\"likebtn-wrapper\"  data-identifier=\"post_76996\"  data-site_id=\"5cc1ecd16fd08b776710d1e9\"  data-theme=\"drop\"  data-btn_size=\"100\"  data-icon_l=\"false\"  data-icon_d=\"false\"  data-icon_l_url=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2019\/04\/happy.png#64794\"  data-icon_d_url=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2019\/04\/sleep.png#64796\"  data-icon_size=\"58\"  data-icon_l_c=\"#771414\"  data-bg_c=\"#ffffff\"  data-bg_c_v=\"#ffffff\"  data-brdr_c=\"#ffffff\"  data-f_size=\"11\"  data-f_family=\"Tahoma\"  data-counter_fs=\"b\"  data-lang=\"fr\"  data-ef_voting=\"wobble\"  data-dislike_enabled=\"false\"  data-counter_type=\"percent\"  data-counter_show=\"false\"  data-tooltip_enabled=\"false\"  data-tooltip_like_show_always=\"true\"  data-white_label=\"true\"  data-i18n_like=\"Aimer \/ Partager\"  data-i18n_dislike=\"Pas aim\u00e9\"  data-style=\"\"  data-unlike_allowed=\"\"  data-show_copyright=\"\"  data-item_url=\"https:\/\/isarta.com\/infos\/comment-detecter-lhameconnage-par-sms\/\"  data-item_title=\"Comment d\u00e9tecter l\u2019hame\u00e7onnage par SMS ?\"  data-item_image=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2020\/07\/luke-porter-UGX2qdjdKkw-unsplash-1024x683.jpg\"  data-item_date=\"2020-07-09T12:35:36-04:00\"  data-engine=\"WordPress\"  data-plugin_v=\"2.6.54\"  data-prx=\"https:\/\/isarta.com\/infos\/wp-admin\/admin-ajax.php?action=likebtn_prx\"  data-event_handler=\"likebtn_eh\" ><\/span><!-- LikeBtn.com END --><\/p>\n<hr size=\"3\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Les pirates informatiques n&rsquo;ont pas pris de pause pendant la COVID-19, bien au contraire. L&rsquo;expert Simon Fontaine, pr\u00e9sident de ARS Solutions, d\u00e9crypte pour Isarta Infos les pratiques d&rsquo;hame\u00e7onnage par SMS.<\/p>\n<div class=\"likebtn_container\" style=\"clear:both;text-align:center;\"><!-- LikeBtn.com BEGIN --><span class=\"likebtn-wrapper\"  data-identifier=\"post_76996\"  data-site_id=\"5cc1ecd16fd08b776710d1e9\"  data-theme=\"drop\"  data-btn_size=\"100\"  data-icon_l=\"false\"  data-icon_d=\"false\"  data-icon_l_url=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2019\/04\/happy.png#64794\"  data-icon_d_url=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2019\/04\/sleep.png#64796\"  data-icon_size=\"58\"  data-icon_l_c=\"#771414\"  data-bg_c=\"#ffffff\"  data-bg_c_v=\"#ffffff\"  data-brdr_c=\"#ffffff\"  data-f_size=\"11\"  data-f_family=\"Tahoma\"  data-counter_fs=\"b\"  data-lang=\"fr\"  data-ef_voting=\"wobble\"  data-dislike_enabled=\"false\"  data-counter_type=\"percent\"  data-counter_show=\"false\"  data-tooltip_enabled=\"false\"  data-tooltip_like_show_always=\"true\"  data-white_label=\"true\"  data-i18n_like=\"Aimer \/ Partager\"  data-i18n_dislike=\"Pas aim\u00e9\"  data-style=\"\"  data-unlike_allowed=\"\"  data-show_copyright=\"\"  data-item_url=\"https:\/\/isarta.com\/infos\/comment-detecter-lhameconnage-par-sms\/\"  data-item_title=\"Comment d\u00e9tecter l\u2019hame\u00e7onnage par SMS ?\"  data-item_image=\"https:\/\/isarta.com\/infos\/wp-content\/uploads\/2020\/07\/luke-porter-UGX2qdjdKkw-unsplash-1024x683.jpg\"  data-item_date=\"2020-07-09T12:35:36-04:00\"  data-engine=\"WordPress\"  data-plugin_v=\"2.6.54\"  data-prx=\"https:\/\/isarta.com\/infos\/wp-admin\/admin-ajax.php?action=likebtn_prx\"  data-event_handler=\"likebtn_eh\" ><\/span><!-- LikeBtn.com END --><hr size=\"3\"><\/div>","protected":false},"author":62,"featured_media":77005,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[175,137,339,1],"tags":[206,811],"_links":{"self":[{"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/posts\/76996"}],"collection":[{"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/comments?post=76996"}],"version-history":[{"count":3,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/posts\/76996\/revisions"}],"predecessor-version":[{"id":77004,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/posts\/76996\/revisions\/77004"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/media\/77005"}],"wp:attachment":[{"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/media?parent=76996"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/categories?post=76996"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/isarta.com\/infos\/wp-json\/wp\/v2\/tags?post=76996"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}