﻿{"id":325,"date":"2019-01-10T14:43:22","date_gmt":"2019-01-10T13:43:22","guid":{"rendered":"http:\/\/www.uqac.ca\/cybersecurite\/?p=325"},"modified":"2019-01-10T20:16:46","modified_gmt":"2019-01-10T19:16:46","slug":"arnaque-fausse-video","status":"publish","type":"post","link":"https:\/\/www.uqac.ca\/cybersecurite\/arnaque-fausse-video\/","title":{"rendered":"Arnaque fausse vid\u00e9o"},"content":{"rendered":"<h6 style=\"color: #5a7411;\">Une menace fr\u00e9quente.<\/h6>\n<p>Une vague d\u2019arnaque de type \u00ab Sextorsion \u00bb se propage depuis l\u2019\u00e9t\u00e9 2018 : les utilisateurs re\u00e7oivent un courriel qui indique que l\u2019exp\u00e9diteur d\u00e9tient leurs mots de passe ainsi qu\u2019une vid\u00e9o compromettante d\u2019eux, prise avec leur propre webcam, alors qu\u2019ils regardaient du contenu pornographique.<br \/>\nLe cybercriminel menace d\u2019envoyer la vid\u00e9o \u00e0 toute leur liste de contacts, s\u2019ils ne proc\u00e8dent pas \u00e0 un paiement en bitcoin. Afin de rendre l\u2019escroquerie plus r\u00e9aliste, les cybercriminels ont achet\u00e9s des listes d\u2019identifiants disponibles sur le Web suite aux violations de donn\u00e9es des derni\u00e8res ann\u00e9es et indiquent un ancien mot de passe dans le courriel.<\/p>\n<p>Voici des indices :<\/p>\n<p>\u2022 Un mot de passe l\u00e9gitime, assez ancien;<br \/>\n\u2022 Une demande de ran\u00e7on par Bitcoin;<br \/>\n\u2022 L\u2019allusion \u00e0 de la pornographie;<br \/>\n\u2022 La menace de diffuser une vid\u00e9o.<\/p>\n<p>Afin de diminuer les risques :<\/p>\n<p>\u2022 D\u00e9sactiver la Webcam ou la couvrir;<br \/>\n\u2022 Changer r\u00e9guli\u00e8rement de mot de passe;<br \/>\n\u2022 Utiliser des mots de passe robustes et diff\u00e9rents;<br \/>\n\u2022 Ne jamais r\u00e9pondre ou payer.<\/p>\n<h6 style=\"color: #5a7411;\">Voici un extrait de ce type de menace:<\/h6>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-329\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2019\/01\/sextorsion-1.jpg\" alt=\"\" width=\"923\" height=\"426\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2019\/01\/sextorsion-1.jpg 923w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2019\/01\/sextorsion-1-300x138.jpg 300w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2019\/01\/sextorsion-1-768x354.jpg 768w\" sizes=\"auto, (max-width: 923px) 100vw, 923px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Une menace fr\u00e9quente. Une vague d\u2019arnaque de type \u00ab Sextorsion \u00bb se propage depuis l\u2019\u00e9t\u00e9 2018 : les utilisateurs re\u00e7oivent un courriel qui indique que l\u2019exp\u00e9diteur d\u00e9tient leurs mots de passe ainsi qu\u2019une vid\u00e9o compromettante d\u2019eux, prise avec leur propre webcam, alors qu\u2019ils regardaient du contenu pornographique. Le cybercriminel menace d\u2019envoyer la vid\u00e9o \u00e0 toute [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":241,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[6],"tags":[],"class_list":["post-325","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tentatives-de-fraude"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/325","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/comments?post=325"}],"version-history":[{"count":8,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/325\/revisions"}],"predecessor-version":[{"id":357,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/325\/revisions\/357"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media\/241"}],"wp:attachment":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media?parent=325"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/categories?post=325"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/tags?post=325"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}