﻿{"id":2588,"date":"2022-08-18T07:53:02","date_gmt":"2022-08-18T12:53:02","guid":{"rendered":"https:\/\/www.uqac.ca\/cybersecurite\/?p=2588"},"modified":"2022-08-18T07:53:33","modified_gmt":"2022-08-18T12:53:33","slug":"attaque-de-mystification-spoofing","status":"publish","type":"post","link":"https:\/\/www.uqac.ca\/cybersecurite\/attaque-de-mystification-spoofing\/","title":{"rendered":"Attaque de mystification (spoofing)"},"content":{"rendered":"\n<div class=\"wp-block-image\"><figure class=\"alignright\"><img loading=\"lazy\" decoding=\"async\" width=\"261\" height=\"296\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/08\/mystification.jpg\" alt=\"\" class=\"wp-image-2589\"\/><\/figure><\/div>\n\n\n\n<p style=\"color:#5a7410\" class=\"has-text-color\">Actuellement les tentatives de fraude par mystification ou\n(spoofing) sont nombreuses. Le spoofing par courriel survient lorsqu\u2019un pirate\nutilise une fausse adresse courriel pour mener une attaque d\u2019ing\u00e9nierie\nsociale. Selon la tactique utilis\u00e9e, l\u2019exp\u00e9diteur peut falsifier l\u2019adresse\ncourriel, le nom d\u2019exp\u00e9diteur, ou les deux. Les cybercriminels peuvent\n\u00e9galement utiliser le spoofing par courriel pour endosser des identit\u00e9s\nmultiples.<\/p>\n\n\n\n<p style=\"color:#5a7410\" class=\"has-text-color\">Par exemple&nbsp;:&nbsp; Vous recevez un courriel d\u2019une de vos connaissances ayant comme seul sujet <strong>Objet:<\/strong> <strong>\u00cates-vous disponible maintenant ?<\/strong><\/p>\n\n\n\n<p style=\"color:#5a7410\" class=\"has-text-color\">Vous aurez tendance \u00e0 r\u00e9pondre \u00e0 la personne et dans la\ns\u00e9quence de courriel le cybercriminel demandera de l\u2019aide financi\u00e8re\n(transfert, achat ou autre).<\/p>\n\n\n\n<p style=\"color:#5a7410\" class=\"has-text-color\"><a href=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2021\/01\/What-is-Spoofing-infographic-FR.pdf\">Pour bien comprendre la mystification (le spoofing).<\/a><br><a href=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2021\/01\/How-to-Protect-Your-Data-from-a-Spoofing-Attack-infographic-FR.pdf\">Pour s\u2019en prot\u00e9ger avant qu\u2019il ne soit trop tard.<\/a><\/p>\n\n\n\n<p style=\"color:#5a7410\" class=\"has-text-color\">Soyez vigilants:<br><a href=\"https:\/\/secure.terranovasite.com\/portal\/Login\/LoginSso?e=84aaf608-9278-4b17-9a30-866caa6ea8f3\">Compl\u00e9tez votre formation en s\u00e9curit\u00e9&nbsp;de&nbsp;l&rsquo;information<\/a><br><a href=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2019\/10\/Semaine-5-Meilleures-pratiques-1.pdf\">Consultez un rappel des meilleures pratiqu<\/a>es <br><a href=\"https:\/\/www.uqac.ca\/cybersecurite\/index.php\/2021\/01\/25\/nouvelles-infographies-pour-bien-comprendre-et-se-proteger\/\">Consultez&nbsp;les&nbsp;infographies&nbsp;sur&nbsp;les&nbsp;cybermenaces<\/a><br><a href=\"https:\/\/www.uqac.ca\/cybersecurite\/\">Consultez le site &nbsp;web de s\u00e9curit\u00e9 de l\u2019information de l\u2019UQAC<\/a><br><a href=\"https:\/\/www.uqac.ca\/cybersecurite\/index.php\/disi\/\">D\u00e9clarez les incidents de s\u00e9curit\u00e9 de l\u2019information<\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Actuellement les tentatives de fraude par mystification ou (spoofing) sont nombreuses. Le spoofing par courriel survient lorsqu\u2019un pirate utilise une fausse adresse courriel pour mener une attaque d\u2019ing\u00e9nierie sociale. Selon la tactique utilis\u00e9e, l\u2019exp\u00e9diteur peut falsifier l\u2019adresse courriel, le nom d\u2019exp\u00e9diteur, ou les deux. Les cybercriminels peuvent \u00e9galement utiliser le spoofing par courriel pour endosser [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":2589,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4,6],"tags":[],"class_list":["post-2588","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-tentatives-de-fraude"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/2588","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/comments?post=2588"}],"version-history":[{"count":4,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/2588\/revisions"}],"predecessor-version":[{"id":2593,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/2588\/revisions\/2593"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media\/2589"}],"wp:attachment":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media?parent=2588"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/categories?post=2588"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/tags?post=2588"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}