{"id":1029,"date":"2020-10-30T20:06:01","date_gmt":"2020-10-30T20:06:01","guid":{"rendered":"https:\/\/webdev.locaterisk.com\/?p=1029"},"modified":"2026-02-12T14:47:35","modified_gmt":"2026-02-12T14:47:35","slug":"social-hacking-cyber-spionage-und-co","status":"publish","type":"post","link":"https:\/\/locaterisk.com\/fr\/social-hacking-cyber-spionage-und-co\/","title":{"rendered":"Piratage social, cyberespionnage et autres"},"content":{"rendered":"<div class=\"wp-block-lr-blog-article-header-module\">\r\n    <div class=\"content\">\r\n\t\t<div class=\"headline\">\r\n\t\t\t<button class=\"to-blog-button\">Retour au blog                <a href=\"https:\/\/locaterisk.com\/fr\/blog\/\"><\/a>\r\n\t\t\t<\/button>\r\n\t\t\t\t\t<\/div>\r\n        <div class=\"main-content\">\r\n\t\t\t\t\t\t<!--\r\n            <div class=\"header\">\r\n                <h6> <\/h6>\r\n            <\/div>\r\n\t\t\t\t\t\t-->\r\n            <h1 class=\"title\">Piratage social, cyberespionnage et autres<\/h1>\r\n            <p class=\"paragraph\">L'usurpation d'identit\u00e9, la fraude par le biais de faux sites web et le cryptage de donn\u00e9es pour extorquer une ran\u00e7on ne repr\u00e9sentent qu'une infime partie des moyens utilis\u00e9s par les cybercriminels pour causer de gros probl\u00e8mes aux entreprises. Vous d\u00e9couvrirez ici quelles sont les possibilit\u00e9s d'attaque utilis\u00e9es par les pirates et ce qu'ils cherchent \u00e0 obtenir.<\/p>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\r\n\r\n\r\n\n\n\n<div class=\"wp-block-lr-blog-image-text-article-module blog-image-text-article\"><div class=\"content\"><div class=\"image\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Cubes-Generic_V02.jpg\"\/><\/div><h6><\/h6><\/div><\/div>\n\n\n\n<p>La cybercriminalit\u00e9 jouera un r\u00f4le de plus en plus important \u00e0 l'avenir. Surtout pour les entreprises. Et ce n'est qu'en connaissant ses adversaires que l'on peut mieux prot\u00e9ger son entreprise. Il est donc d'autant plus important de conna\u00eetre les technologies utilis\u00e9es par les attaquants et de comprendre leurs modes de fonctionnement dans les grandes lignes. Rien qu'en Allemagne, des attaques d'un montant \u00e0 six chiffres ont lieu chaque jour et la tendance est \u00e0 la hausse. La vitesse \u00e0 laquelle les attaques sont men\u00e9es ainsi que la cible des attaquants \u00e9voluent. Par exemple, avec 190 Gbits par seconde, ce ne sont plus seulement les syst\u00e8mes d'exploitation ou les navigateurs qui sont attaqu\u00e9s, mais aussi, entre autres, les puces, les processeurs et les cam\u00e9ras de surveillance.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Erreur humaine, mat\u00e9riel obsol\u00e8te et absence de mises \u00e0 jour<\/h3>\n\n\n\n<p>Des facteurs tels qu'un logiciel obsol\u00e8te, une erreur humaine, un mat\u00e9riel obsol\u00e8te ou insuffisant et des mises \u00e0 jour non effectu\u00e9es facilitent souvent la r\u00e9ussite d'une attaque par des pirates. En 2019, dans le cadre d'une \u00e9tude sur l'utilisation des mots de passe, l'Institut Hasso Plattner a analys\u00e9 pr\u00e8s d'un milliard de comptes d'utilisateurs qui, en raison de lacunes dans les donn\u00e9es, \u00e9taient tous disponibles l\u00e9galement et librement sur Internet. Il a \u00e9t\u00e9 constat\u00e9 que 20 % des utilisateurs utilisent des mots de passe identiques pour diff\u00e9rents comptes ou ne les modifient que l\u00e9g\u00e8rement. Le r\u00e9sultat le plus choquant a \u00e9t\u00e9 l'identification de la combinaison de chiffres 123456 comme mot de passe le plus utilis\u00e9. Ceux qui pensent que les mots de passe faciles \u00e0 d\u00e9chiffrer dans la vie priv\u00e9e des collaborateurs ne constituent pas un probl\u00e8me pour leur propre entreprise se trompent. De nombreux collaborateurs apportent leurs appareils priv\u00e9s dans le r\u00e9seau de l'entreprise. Si ceux-ci ne sont pas suffisamment s\u00e9curis\u00e9s, les pirates peuvent rapidement avoir acc\u00e8s aux donn\u00e9es internes de l'entreprise. Mais quelles sont les possibilit\u00e9s d'attaque pour les cybercriminels ? Nous en pr\u00e9sentons ensuite cinq.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. hame\u00e7onnage<\/h3>\n\n\n\n<p>Le phishing consiste par exemple \u00e0 falsifier des e-mails, des blogs ou des sites web entiers d'entreprises. L'objectif est d'inciter les utilisateurs \u00e0 divulguer leurs donn\u00e9es. Comme ces derniers pensent qu'il s'agit du site web original, ils le r\u00e9v\u00e8lent. R\u00e9troactivement, les entreprises concern\u00e9es peuvent subir un pr\u00e9judice, car les utilisateurs ne leur font plus confiance et ne veulent pas fournir d'informations priv\u00e9es. La r\u00e9putation peut en cons\u00e9quence chuter \u00e9norm\u00e9ment. De plus, les cybercriminels acc\u00e8dent ainsi \u00e0 une multitude d'informations priv\u00e9es.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. piratage social<\/h3>\n\n\n\n<p>Dans le cas du piratage social, ce ne sont pas les syst\u00e8mes qui sont vis\u00e9s par l'attaque, mais l'entreprise et les collaborateurs. Cela peut par exemple se faire par le biais d'e-mails. Les attaques dissimul\u00e9es via le social hacking sont souvent men\u00e9es sur une longue p\u00e9riode. L'objectif des pirates est de dissimuler l'attaque de piratage gr\u00e2ce \u00e0 ce laps de temps important, car les utilisateurs y sont ainsi moins souvent attentifs. Pour r\u00e9duire le risque de social hacking, il est important de sensibiliser les collaborateurs \u00e0 ce sujet afin qu'ils puissent reconna\u00eetre les tentatives d'attaque potentielles et r\u00e9agir en cons\u00e9quence. Lisez \u00e0 ce sujet notre article 8 mesures de protection contre la cybercriminalit\u00e9 - Ces mesures de s\u00e9curit\u00e9 devraient \u00eatre prises par chaque entreprise.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. les attaques par d\u00e9ni de service (DoS) et par d\u00e9ni de service distribu\u00e9 (DDoS)<\/h3>\n\n\n\n<p>Lors d'une attaque par d\u00e9ni de service, les syst\u00e8mes sont bombard\u00e9s de mani\u00e8re cibl\u00e9e par tant de demandes simultan\u00e9es qu'ils ne peuvent plus effectuer les t\u00e2ches. C'est un peu comme si de plus en plus de personnes vous lan\u00e7aient une balle, si bien qu'\u00e0 un moment donn\u00e9, vous n'\u00eates plus en mesure de toutes les attraper. Si une telle attaque est ex\u00e9cut\u00e9e en parall\u00e8le par un grand nombre d'ordinateurs h\u00f4tes sur lesquels le pirate a install\u00e9 un logiciel malveillant, le processus est appel\u00e9 attaque DDoS. Les attaques de ce type ont pour cons\u00e9quence qu'un site web n'est par exemple pas accessible, que les clients ne peuvent pas passer de commande, etc.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. les ransomwares<\/h3>\n\n\n\n<p>Lorsqu'on parle de randsomware, on fait r\u00e9f\u00e9rence \u00e0 une forme de chantage. Dans ce cadre, les pirates informatiques infectent par exemple l'ordinateur avec un logiciel malveillant qui crypte tous les fichiers. Les donn\u00e9es ne sont d\u00e9crypt\u00e9es qu'apr\u00e8s le paiement d'une somme d'argent. Plusieurs probl\u00e8mes se posent alors aux entreprises. D'une part, elles garantissent \u00e0 leurs clients qu'elles traitent leurs donn\u00e9es de mani\u00e8re responsable et s\u00fbre et ne peuvent pas tenir cette promesse. D'autre part, elles ont besoin des donn\u00e9es pour pouvoir travailler elles-m\u00eames.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. le cyberespionnage<\/h3>\n\n\n\n<p>L'espionnage classique pour acc\u00e9der \u00e0 des informations ne cesse d'augmenter. L'espionnage \u00e9conomique num\u00e9rique co\u00fbte \u00e0 l'\u00e9conomie allemande au moins 50 milliards d'euros par an. Au cours des dix \u00e0 quinze derni\u00e8res ann\u00e9es, les attaques contre les syst\u00e8mes et les r\u00e9seaux informatiques se sont \u00e9norm\u00e9ment professionnalis\u00e9es. Ceux qui pensent que les petites et moyennes entreprises ne sont pas concern\u00e9es par ce type de probl\u00e8mes se trompent. Des \u00e9tudes r\u00e9centes d\u00e9montrent r\u00e9guli\u00e8rement que m\u00eame les entreprises de cette taille ne sont pas prot\u00e9g\u00e9es contre le cyberespionnage.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-contact-post-module\">\n\t<div id=\"lr-contact-form\" class=\"wp-block-lr-contact-post-module\">\n\t\t<div id=\"formular\" class=\"content\">\n\t\t\t<div class=\"inner-content\">\n\t\t\t\t<div class=\"column-2 feature-mode\">\n\t\t\t\t\t<h2>Demandez maintenant une D\u00e9mo en direct personelle<\/h2>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t\t\t<p class=\"margin-b-36\">Identifiez et r\u00e9duisez vos cyber-risques gr\u00e2ce \u00e0 un aper\u00e7u comparable et compr\u00e9hensible de votre s\u00e9curit\u00e9 informatique. Demandez conseil \u00e0 nos experts et d\u00e9couvrez comment LocateRisk peut vous aider \u00e0 r\u00e9soudre vos cyber-risques.<\/p>\n\t\t\t\t\t\t\t<\/div>\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div> \n\t\t\t\t<div class=\"column-2\">\n\t\t\t\t\t<form action=\"\" class=\"form\" method=\"post\" role=\"form\" novalidate data-trp-original-action=\"\">\n\t\t\t\t\t\t<input type=\"text\" id=\"successmessage\" name=\"successmessage\" value=\"\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"errormessage\" name=\"errormessage\" value=\"\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"slug\" name=\"slug\" value=\"social-hacking-cyber-spionage-und-co\" hidden>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"name\"\n\t\t\t\t\t\t\t\tname=\"name\"\n\t\t\t\t\t\t\t\tplaceholder=\"Pr\u00e9nom\"\n\t\t\t\t\t\t\t\trequired\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"surname\"\n\t\t\t\t\t\t\t\tname=\"surname\"\n\t\t\t\t\t\t\t\tplaceholder=\"Nom\"\n\t\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"email\"\n\t\t\t\t\t\t\tid=\"email\"\n\t\t\t\t\t\t\tname=\"email\"\n\t\t\t\t\t\t\tplaceholder=\"Courrier \u00e9lectronique\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\tid=\"phone\"\n\t\t\t\t\t\t\tname=\"phone\"\n\t\t\t\t\t\t\tplaceholder=\"T\u00e9l\u00e9phone\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<h6 class=\"error-message\" hidden>...<\/h6>\n\t\t\t\t\t\t<div class=\"checkbox_container\">\n\t\t\t\t\t\t\t<div class=\"checkbox\">\n\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\t\ttype=\"checkbox\"\n\t\t\t\t\t\t\t\t\tid=\"checkbox\"\n\t\t\t\t\t\t\t\t\tname=\"checkbox\" \/>\n\n\t\t\t\t\t\t\t\t<label for=\"checkbox\"><\/label>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<p>J'ai fait le <a href=\"https:\/\/locaterisk.com\/fr\/datenschutz\/\" target=\"_blank\" rel=\"noreferrer noopener\">politique de confidentialit\u00e9.<\/a> lu<\/p> \n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"g-recaptcha\" data-sitekey=\"6LdErNoZAAAAAD1Re2jNxtDFfcDaL9iED5MRBzjR\" data-callback=\"verifyRecaptchaCallback\" data-expired-callback=\"expiredRecaptchaCallback\"><\/div>\n\t\t\t\t\t<input type=\"hidden\" name=\"g-recaptcha-response\" data-recaptcha \/>\n\n\t\t\t\t\t\t<button class=\"lr-button-link\" type=\"submit\">Fixer un rendez-vous pour une d\u00e9mo en direct<\/button>\n\t\t\t\t\t<input type=\"hidden\" name=\"trp-form-language\" value=\"fr\"\/><\/form>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\n\t<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-lr-contact-module\"><div class=\"content\"><h2>En savoir plus, r\u00e9server une d\u00e9mo ou simplement \u00e9changer quelques mots ? Nous nous en r\u00e9jouissons !<\/h2><div class=\"contact-info-row\"><div class=\"contact-person-info\"><div class=\"avatar\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/06\/Lukas_Baumann_LocateRisk-300.png\"><\/div><p><span class=\"text before\">Votre Contact<\/span><span class=\"bold name\"><strong>Lukas<\/strong><\/span> <span class=\"lastname\"><strong>Baumann<strong><\/strong><\/strong><\/span><strong><strong><span class=\"separator\"><\/span><span class=\"role\">PDG<\/span><\/strong><\/strong><\/p><\/div><p class=\"bold phone\"><strong><strong>+49 6151 6290246<\/strong><\/strong><\/p><strong><strong><a class=\"pr-1\" href=\"mailto: sales@locaterisk.com\">Contactez-nous maintenant<\/a><\/strong><\/strong><\/div><\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-footer-module lr-footer-block\"><div class=\"content\"><div class=\"column0\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/assets\/img\/lr-logo.svg\"\/><\/div><div class=\"categories\"><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/locaterisk.com\/fr\/\">Accueil<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/blog\/\">Blog<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/about\/\">par rapport \u00e0 nous<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/kontakt\/\">Contact<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/impressum\/\">mentiones l\u00e9gales<\/a><\/div><div class=\"categories-break\"><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/datenschutz\/\">Confidentialit\u00e9<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/agb.pdf\">CONDITIONS G\u00c9N\u00c9RALES DE VENTE<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/jobs\/\">Carri\u00e8re<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/sec-information.pdf\">s\u00e9curit\u00e9<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/app.secfix.com\/trust\/locaterisk\/d1e7d433b33643aea1880bfbfeab9f60\">Centre de confiance<\/a><\/div><\/div><div class=\"social\"><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/10\/gruppe-230@3x.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.instagram.com\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Instagram.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/twitter.com\/locaterisk\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/twitter.png\"\/><\/a><\/div><\/div><div class=\"description\"><h6>\u00a9 LocateRisk 2026<\/h6><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Cyberkriminalit\u00e4t spielt in der Zukunft eine immer gr\u00f6\u00dfere Rolle. Vor allem auch f\u00fcr Unternehmen. Und nur wer seine Gegner kennt, kann sein Unternehmen besser sch\u00fctzen. Daher ist es umso wichtiger, die von Angreifern eingesetzten Technologien zu kennen und ihre Funktionsweisen im Ansatz zu verstehen. Alleine in Deutschland finden t\u00e4glich Angriffe im hohen sechsstelligen Bereich statt [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":1056,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1029","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Social Hacking, Cyber Spionage und Co. - LocateRisk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/locaterisk.com\/fr\/social-hacking-cyber-spionage-und-co\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Social Hacking, Cyber Spionage und Co. - LocateRisk\" \/>\n<meta property=\"og:description\" content=\"Cyberkriminalit\u00e4t spielt in der Zukunft eine immer gr\u00f6\u00dfere Rolle. Vor allem auch f\u00fcr Unternehmen. Und nur wer seine Gegner kennt, kann sein Unternehmen besser sch\u00fctzen. Daher ist es umso wichtiger, die von Angreifern eingesetzten Technologien zu kennen und ihre Funktionsweisen im Ansatz zu verstehen. Alleine in Deutschland finden t\u00e4glich Angriffe im hohen sechsstelligen Bereich statt [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/locaterisk.com\/fr\/social-hacking-cyber-spionage-und-co\/\" \/>\n<meta property=\"og:site_name\" content=\"LocateRisk\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-30T20:06:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-12T14:47:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Cubes_Generisch_01.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lukas Baumann\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lukas Baumann\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/social-hacking-cyber-spionage-und-co\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/social-hacking-cyber-spionage-und-co\\\/\"},\"author\":{\"name\":\"Lukas Baumann\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/be285cd2771072ea30354332ce8b19cf\"},\"headline\":\"Social Hacking, Cyber Spionage und Co.\",\"datePublished\":\"2020-10-30T20:06:01+00:00\",\"dateModified\":\"2026-02-12T14:47:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/social-hacking-cyber-spionage-und-co\\\/\"},\"wordCount\":705,\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/social-hacking-cyber-spionage-und-co\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Cubes_Generisch_01.jpg\",\"articleSection\":[\"Blog post\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/social-hacking-cyber-spionage-und-co\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/social-hacking-cyber-spionage-und-co\\\/\",\"name\":\"Social Hacking, Cyber Spionage und Co. - LocateRisk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/social-hacking-cyber-spionage-und-co\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/social-hacking-cyber-spionage-und-co\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Cubes_Generisch_01.jpg\",\"datePublished\":\"2020-10-30T20:06:01+00:00\",\"dateModified\":\"2026-02-12T14:47:35+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/social-hacking-cyber-spionage-und-co\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/locaterisk.com\\\/social-hacking-cyber-spionage-und-co\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/social-hacking-cyber-spionage-und-co\\\/#primaryimage\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Cubes_Generisch_01.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Cubes_Generisch_01.jpg\",\"width\":1080,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/social-hacking-cyber-spionage-und-co\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/locaterisk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Social Hacking, Cyber Spionage und Co.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"name\":\"LocateRisk\",\"description\":\"IT-Sicherheit messen und vergleichen\",\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\",\"name\":\"LocateRisk\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"LocateRisk\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/locaterisk\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/be285cd2771072ea30354332ce8b19cf\",\"name\":\"Lukas Baumann\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c10e053effbd842a0cb8e0fdb227381472ec76a6419d29b4eaa27b5bbb937098?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c10e053effbd842a0cb8e0fdb227381472ec76a6419d29b4eaa27b5bbb937098?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c10e053effbd842a0cb8e0fdb227381472ec76a6419d29b4eaa27b5bbb937098?s=96&d=mm&r=g\",\"caption\":\"Lukas Baumann\"},\"sameAs\":[\"http:\\\/\\\/www.locaterisk.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Piratage social, cyberespionnage et autres - LocateRisk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/locaterisk.com\/fr\/social-hacking-cyber-spionage-und-co\/","og_locale":"fr_FR","og_type":"article","og_title":"Social Hacking, Cyber Spionage und Co. - LocateRisk","og_description":"Cyberkriminalit\u00e4t spielt in der Zukunft eine immer gr\u00f6\u00dfere Rolle. Vor allem auch f\u00fcr Unternehmen. Und nur wer seine Gegner kennt, kann sein Unternehmen besser sch\u00fctzen. Daher ist es umso wichtiger, die von Angreifern eingesetzten Technologien zu kennen und ihre Funktionsweisen im Ansatz zu verstehen. Alleine in Deutschland finden t\u00e4glich Angriffe im hohen sechsstelligen Bereich statt [&hellip;]","og_url":"https:\/\/locaterisk.com\/fr\/social-hacking-cyber-spionage-und-co\/","og_site_name":"LocateRisk","article_published_time":"2020-10-30T20:06:01+00:00","article_modified_time":"2026-02-12T14:47:35+00:00","og_image":[{"width":1080,"height":1080,"url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Cubes_Generisch_01.jpg","type":"image\/jpeg"}],"author":"Lukas Baumann","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Lukas Baumann","Dur\u00e9e de lecture estim\u00e9e":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/locaterisk.com\/social-hacking-cyber-spionage-und-co\/#article","isPartOf":{"@id":"https:\/\/locaterisk.com\/social-hacking-cyber-spionage-und-co\/"},"author":{"name":"Lukas Baumann","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/be285cd2771072ea30354332ce8b19cf"},"headline":"Social Hacking, Cyber Spionage und Co.","datePublished":"2020-10-30T20:06:01+00:00","dateModified":"2026-02-12T14:47:35+00:00","mainEntityOfPage":{"@id":"https:\/\/locaterisk.com\/social-hacking-cyber-spionage-und-co\/"},"wordCount":705,"publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"image":{"@id":"https:\/\/locaterisk.com\/social-hacking-cyber-spionage-und-co\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Cubes_Generisch_01.jpg","articleSection":["Blog post"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/locaterisk.com\/social-hacking-cyber-spionage-und-co\/","url":"https:\/\/locaterisk.com\/social-hacking-cyber-spionage-und-co\/","name":"Piratage social, cyberespionnage et autres - LocateRisk","isPartOf":{"@id":"https:\/\/locaterisk.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/locaterisk.com\/social-hacking-cyber-spionage-und-co\/#primaryimage"},"image":{"@id":"https:\/\/locaterisk.com\/social-hacking-cyber-spionage-und-co\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Cubes_Generisch_01.jpg","datePublished":"2020-10-30T20:06:01+00:00","dateModified":"2026-02-12T14:47:35+00:00","breadcrumb":{"@id":"https:\/\/locaterisk.com\/social-hacking-cyber-spionage-und-co\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/locaterisk.com\/social-hacking-cyber-spionage-und-co\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/locaterisk.com\/social-hacking-cyber-spionage-und-co\/#primaryimage","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Cubes_Generisch_01.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Cubes_Generisch_01.jpg","width":1080,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/locaterisk.com\/social-hacking-cyber-spionage-und-co\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/locaterisk.com\/"},{"@type":"ListItem","position":2,"name":"Social Hacking, Cyber Spionage und Co."}]},{"@type":"WebSite","@id":"https:\/\/locaterisk.com\/de\/#website","url":"https:\/\/locaterisk.com\/de\/","name":"LocateRisk","description":"Mesurer et comparer la s\u00e9curit\u00e9 informatique","publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/locaterisk.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/locaterisk.com\/de\/#organization","name":"LocateRisk","url":"https:\/\/locaterisk.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","width":1920,"height":1080,"caption":"LocateRisk"},"image":{"@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/locaterisk\/"]},{"@type":"Person","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/be285cd2771072ea30354332ce8b19cf","name":"Lukas Baumann","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/c10e053effbd842a0cb8e0fdb227381472ec76a6419d29b4eaa27b5bbb937098?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c10e053effbd842a0cb8e0fdb227381472ec76a6419d29b4eaa27b5bbb937098?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c10e053effbd842a0cb8e0fdb227381472ec76a6419d29b4eaa27b5bbb937098?s=96&d=mm&r=g","caption":"Lukas Baumann"},"sameAs":["http:\/\/www.locaterisk.com"]}]}},"_links":{"self":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/posts\/1029","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/comments?post=1029"}],"version-history":[{"count":34,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/posts\/1029\/revisions"}],"predecessor-version":[{"id":7582,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/posts\/1029\/revisions\/7582"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/media\/1056"}],"wp:attachment":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/media?parent=1029"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/categories?post=1029"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/tags?post=1029"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}