Des pirates ont trouv\u00e9 une m\u00e9thode infaillible pour voler vos codes d'authentification, voici comment ils s'y prennent<\/title>\n<meta name=\"description\" content=\"Des cybercriminels ont trouv\u00e9 un nouveau moyen de contourner l'authentification \u00e0 deux avec des robots aliment\u00e9s \u00e0 l\u2019IA.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.phonandroid.com\/des-pirates-ont-trouve-une-methode-infaillible-pour-voler-vos-codes-dauthentification-voici-comment-ils-sy-prennent.html\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Des pirates ont trouv\u00e9 une m\u00e9thode infaillible pour voler vos codes d'authentification, voici comment ils s'y prennent\" \/>\n<meta property=\"og:description\" content=\"Des cybercriminels ont trouv\u00e9 un nouveau moyen de contourner l'authentification \u00e0 deux avec des robots aliment\u00e9s \u00e0 l\u2019IA.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.phonandroid.com\/des-pirates-ont-trouve-une-methode-infaillible-pour-voler-vos-codes-dauthentification-voici-comment-ils-sy-prennent.html\" \/>\n<meta property=\"og:site_name\" content=\"PhonAndroid\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/phonandroid\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-14T12:27:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wp-pa.phonandroid.com\/uploads\/2024\/06\/vole-code-2FA.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"750\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alexandre Mathiot\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@phonandroid\" \/>\n<meta name=\"twitter:site\" content=\"@phonandroid\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alexandre Mathiot\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.phonandroid.com\/des-pirates-ont-trouve-une-methode-infaillible-pour-voler-vos-codes-dauthentification-voici-comment-ils-sy-prennent.html#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.phonandroid.com\/des-pirates-ont-trouve-une-methode-infaillible-pour-voler-vos-codes-dauthentification-voici-comment-ils-sy-prennent.html\"},\"author\":{\"name\":\"Alexandre Mathiot\",\"@id\":\"https:\/\/www.phonandroid.com\/#\/schema\/person\/1a6a6318b35d190a7bd77984d9eaa853\"},\"headline\":\"Des pirates ont trouv\u00e9 une m\u00e9thode infaillible pour voler vos codes d’authentification, voici comment ils s’y prennent\",\"datePublished\":\"2024-06-14T12:27:32+00:00\",\"dateModified\":\"2024-06-14T12:27:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.phonandroid.com\/des-pirates-ont-trouve-une-methode-infaillible-pour-voler-vos-codes-dauthentification-voici-comment-ils-sy-prennent.html\"},\"wordCount\":467,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.phonandroid.com\/#organization\"},\"articleSection\":[\"S\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.phonandroid.com\/des-pirates-ont-trouve-une-methode-infaillible-pour-voler-vos-codes-dauthentification-voici-comment-ils-sy-prennent.html#respond\"]}],\"copyrightYear\":\"2024\",\"copyrightHolder\":{\"@id\":\"https:\/\/www.phonandroid.com\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.phonandroid.com\/des-pirates-ont-trouve-une-methode-infaillible-pour-voler-vos-codes-dauthentification-voici-comment-ils-sy-prennent.html\",\"url\":\"https:\/\/www.phonandroid.com\/des-pirates-ont-trouve-une-methode-infaillible-pour-voler-vos-codes-dauthentification-voici-comment-ils-sy-prennent.html\",\"name\":\"Des pirates ont trouv\u00e9 une m\u00e9thode infaillible pour voler vos codes d'authentification, voici comment ils s'y prennent\",\"isPartOf\":{\"@id\":\"https:\/\/www.phonandroid.com\/#website\"},\"datePublished\":\"2024-06-14T12:27:32+00:00\",\"dateModified\":\"2024-06-14T12:27:32+00:00\",\"description\":\"Des cybercriminels ont trouv\u00e9 un nouveau moyen de contourner l'authentification \u00e0 deux avec des robots aliment\u00e9s \u00e0 l\u2019IA.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.phonandroid.com\/des-pirates-ont-trouve-une-methode-infaillible-pour-voler-vos-codes-dauthentification-voici-comment-ils-sy-prennent.html#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.phonandroid.com\/des-pirates-ont-trouve-une-methode-infaillible-pour-voler-vos-codes-dauthentification-voici-comment-ils-sy-prennent.html\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.phonandroid.com\/des-pirates-ont-trouve-une-methode-infaillible-pour-voler-vos-codes-dauthentification-voici-comment-ils-sy-prennent.html#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.phonandroid.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Des pirates ont trouv\u00e9 une m\u00e9thode infaillible pour voler vos codes d’authentification, voici comment ils s’y prennent\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.phonandroid.com\/#website\",\"url\":\"https:\/\/www.phonandroid.com\/\",\"name\":\"PhonAndroid\",\"description\":\"PhonAndroid\",\"publisher\":{\"@id\":\"https:\/\/www.phonandroid.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.phonandroid.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.phonandroid.com\/#organization\",\"name\":\"PhonAndroid\",\"url\":\"https:\/\/www.phonandroid.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.phonandroid.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.phonandroid.com\/wp-content\/themes\/phonadroid-v3\/assets\/images\/lg-phonandroid-amp-4.png\",\"contentUrl\":\"https:\/\/img.phonandroid.com\/2023\/06\/dark.png\",\"width\":280,\"height\":60,\"caption\":\"PhonAndroid\"},\"image\":{\"@id\":\"https:\/\/www.phonandroid.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/phonandroid\",\"https:\/\/twitter.com\/phonandroid\",\"https:\/\/www.youtube.com\/user\/Phonandroidtv\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.phonandroid.com\/#\/schema\/person\/1a6a6318b35d190a7bd77984d9eaa853\",\"name\":\"Alexandre Mathiot\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.phonandroid.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5bbca6bb230ffe967078fb46a73208b0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5bbca6bb230ffe967078fb46a73208b0?s=96&d=mm&r=g\",\"caption\":\"Alexandre Mathiot\"},\"description\":\"Moniteur de plong\u00e9e sous-marine technique. Je suis passionn\u00e9 par les mondes sous-marins. De plus, l'expertise technologique que j'ai acquise dans mes \u00e9tudes d'ing\u00e9nieur me permet d'offrir un enseignement de qualit\u00e9 \u00e0 mes \u00e9l\u00e8ves. Je suis \u00e9galement assez sportif, pratiquant l'apn\u00e9e et la callisth\u00e9nie apr\u00e8s des ann\u00e9es de sports de combat. \u00c0 mes heures perdues, je me plonge dans les news automobiles et moyens de transport en g\u00e9n\u00e9ral. Je suis passionn\u00e9 par les innovations technologiques comme les voitures volantes pour m'imaginer dans un futur \u00e0 la Blade Runner...\",\"url\":\"https:\/\/www.phonandroid.com\/author\/alexandremathiot\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Des pirates ont trouv\u00e9 une m\u00e9thode infaillible pour voler vos codes d'authentification, voici comment ils s'y prennent","description":"Des cybercriminels ont trouv\u00e9 un nouveau moyen de contourner l'authentification \u00e0 deux avec des robots aliment\u00e9s \u00e0 l\u2019IA.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.phonandroid.com\/des-pirates-ont-trouve-une-methode-infaillible-pour-voler-vos-codes-dauthentification-voici-comment-ils-sy-prennent.html","og_locale":"fr_FR","og_type":"article","og_title":"Des pirates ont trouv\u00e9 une m\u00e9thode infaillible pour voler vos codes d'authentification, voici comment ils s'y prennent","og_description":"Des cybercriminels ont trouv\u00e9 un nouveau moyen de contourner l'authentification \u00e0 deux avec des robots aliment\u00e9s \u00e0 l\u2019IA.","og_url":"https:\/\/www.phonandroid.com\/des-pirates-ont-trouve-une-methode-infaillible-pour-voler-vos-codes-dauthentification-voici-comment-ils-sy-prennent.html","og_site_name":"PhonAndroid","article_publisher":"https:\/\/www.facebook.com\/phonandroid","article_published_time":"2024-06-14T12:27:32+00:00","og_image":[{"width":1200,"height":750,"url":"https:\/\/wp-pa.phonandroid.com\/uploads\/2024\/06\/vole-code-2FA.jpeg","type":"image\/jpeg"}],"author":"Alexandre Mathiot","twitter_card":"summary_large_image","twitter_creator":"@phonandroid","twitter_site":"@phonandroid","twitter_misc":{"Written by":"Alexandre Mathiot","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.phonandroid.com\/des-pirates-ont-trouve-une-methode-infaillible-pour-voler-vos-codes-dauthentification-voici-comment-ils-sy-prennent.html#article","isPartOf":{"@id":"https:\/\/www.phonandroid.com\/des-pirates-ont-trouve-une-methode-infaillible-pour-voler-vos-codes-dauthentification-voici-comment-ils-sy-prennent.html"},"author":{"name":"Alexandre Mathiot","@id":"https:\/\/www.phonandroid.com\/#\/schema\/person\/1a6a6318b35d190a7bd77984d9eaa853"},"headline":"Des pirates ont trouv\u00e9 une m\u00e9thode infaillible pour voler vos codes d’authentification, voici comment ils s’y prennent","datePublished":"2024-06-14T12:27:32+00:00","dateModified":"2024-06-14T12:27:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.phonandroid.com\/des-pirates-ont-trouve-une-methode-infaillible-pour-voler-vos-codes-dauthentification-voici-comment-ils-sy-prennent.html"},"wordCount":467,"commentCount":0,"publisher":{"@id":"https:\/\/www.phonandroid.com\/#organization"},"articleSection":["S\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.phonandroid.com\/des-pirates-ont-trouve-une-methode-infaillible-pour-voler-vos-codes-dauthentification-voici-comment-ils-sy-prennent.html#respond"]}],"copyrightYear":"2024","copyrightHolder":{"@id":"https:\/\/www.phonandroid.com\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.phonandroid.com\/des-pirates-ont-trouve-une-methode-infaillible-pour-voler-vos-codes-dauthentification-voici-comment-ils-sy-prennent.html","url":"https:\/\/www.phonandroid.com\/des-pirates-ont-trouve-une-methode-infaillible-pour-voler-vos-codes-dauthentification-voici-comment-ils-sy-prennent.html","name":"Des pirates ont trouv\u00e9 une m\u00e9thode infaillible pour voler vos codes d'authentification, voici comment ils s'y prennent","isPartOf":{"@id":"https:\/\/www.phonandroid.com\/#website"},"datePublished":"2024-06-14T12:27:32+00:00","dateModified":"2024-06-14T12:27:32+00:00","description":"Des cybercriminels ont trouv\u00e9 un nouveau moyen de contourner l'authentification \u00e0 deux avec des robots aliment\u00e9s \u00e0 l\u2019IA.","breadcrumb":{"@id":"https:\/\/www.phonandroid.com\/des-pirates-ont-trouve-une-methode-infaillible-pour-voler-vos-codes-dauthentification-voici-comment-ils-sy-prennent.html#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.phonandroid.com\/des-pirates-ont-trouve-une-methode-infaillible-pour-voler-vos-codes-dauthentification-voici-comment-ils-sy-prennent.html"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.phonandroid.com\/des-pirates-ont-trouve-une-methode-infaillible-pour-voler-vos-codes-dauthentification-voici-comment-ils-sy-prennent.html#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.phonandroid.com\/"},{"@type":"ListItem","position":2,"name":"Des pirates ont trouv\u00e9 une m\u00e9thode infaillible pour voler vos codes d’authentification, voici comment ils s’y prennent"}]},{"@type":"WebSite","@id":"https:\/\/www.phonandroid.com\/#website","url":"https:\/\/www.phonandroid.com\/","name":"PhonAndroid","description":"PhonAndroid","publisher":{"@id":"https:\/\/www.phonandroid.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.phonandroid.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.phonandroid.com\/#organization","name":"PhonAndroid","url":"https:\/\/www.phonandroid.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.phonandroid.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.phonandroid.com\/wp-content\/themes\/phonadroid-v3\/assets\/images\/lg-phonandroid-amp-4.png","contentUrl":"https:\/\/img.phonandroid.com\/2023\/06\/dark.png","width":280,"height":60,"caption":"PhonAndroid"},"image":{"@id":"https:\/\/www.phonandroid.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/phonandroid","https:\/\/twitter.com\/phonandroid","https:\/\/www.youtube.com\/user\/Phonandroidtv"]},{"@type":"Person","@id":"https:\/\/www.phonandroid.com\/#\/schema\/person\/1a6a6318b35d190a7bd77984d9eaa853","name":"Alexandre Mathiot","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.phonandroid.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5bbca6bb230ffe967078fb46a73208b0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5bbca6bb230ffe967078fb46a73208b0?s=96&d=mm&r=g","caption":"Alexandre Mathiot"},"description":"Moniteur de plong\u00e9e sous-marine technique. Je suis passionn\u00e9 par les mondes sous-marins. De plus, l'expertise technologique que j'ai acquise dans mes \u00e9tudes d'ing\u00e9nieur me permet d'offrir un enseignement de qualit\u00e9 \u00e0 mes \u00e9l\u00e8ves. Je suis \u00e9galement assez sportif, pratiquant l'apn\u00e9e et la callisth\u00e9nie apr\u00e8s des ann\u00e9es de sports de combat. \u00c0 mes heures perdues, je me plonge dans les news automobiles et moyens de transport en g\u00e9n\u00e9ral. Je suis passionn\u00e9 par les innovations technologiques comme les voitures volantes pour m'imaginer dans un futur \u00e0 la Blade Runner...","url":"https:\/\/www.phonandroid.com\/author\/alexandremathiot"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/posts\/2596147","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/users\/150"}],"replies":[{"embeddable":true,"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/comments?post=2596147"}],"version-history":[{"count":16,"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/posts\/2596147\/revisions"}],"predecessor-version":[{"id":2596156,"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/posts\/2596147\/revisions\/2596156"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/media\/2596153"}],"wp:attachment":[{"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/media?parent=2596147"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/categories?post=2596147"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/tags?post=2596147"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}

{"id":2596147,"date":"2024-06-14T14:27:32","date_gmt":"2024-06-14T12:27:32","guid":{"rendered":"https:\/\/www.phonandroid.com\/?p=2596147"},"modified":"2024-06-14T14:27:32","modified_gmt":"2024-06-14T12:27:32","slug":"des-pirates-ont-trouve-une-methode-infaillible-pour-voler-vos-codes-dauthentification-voici-comment-ils-sy-prennent","status":"publish","type":"post","link":"https:\/\/www.phonandroid.com\/des-pirates-ont-trouve-une-methode-infaillible-pour-voler-vos-codes-dauthentification-voici-comment-ils-sy-prennent.html","title":{"rendered":"Des pirates ont trouv\u00e9 une m\u00e9thode infaillible pour voler vos codes d’authentification, voici comment ils s’y prennent"},"content":{"rendered":"

Des cybercriminels ont trouv\u00e9 un nouveau moyen de contourner l'authentification \u00e0 deux (2FA) facteurs. Ils utilisent des robots aliment\u00e9s \u00e0 l\u2019intelligence artificielle pour obtenir les codes de s\u00e9curit\u00e9 envoy\u00e9s aux utilisateurs et acc\u00e9der \u00e0 leurs comptes.<\/strong><\/p>\n

\"vole<\/p>\n

L'authentification \u00e0 deux facteurs<\/strong> (2FA) est devenue une norme de s\u00e9curit\u00e9 sur de nombreuses plateformes en ligne. Elle ajoute une couche suppl\u00e9mentaire de protection pour les comptes des utilisateurs. En plus du mot de passe habituel, ces derniers doivent fournir un code de s\u00e9curit\u00e9 envoy\u00e9 par SMS<\/strong>, email, ou via une application.<\/p>\n

Cette m\u00e9thode a prouv\u00e9 son efficacit\u00e9 pour prot\u00e9ger les comptes m\u00eame si le mot de passe est compromis. Toutefois, des campagnes de phishing, comme celle qui avait cibl\u00e9 les utilisateurs d'Instagram<\/a> sous pr\u00e9texte de violations des droits d'auteur, et des fuites massives de donn\u00e9es exposant des codes 2FA<\/a>, montrent que cette methode n'est pas infaillible<\/strong>.<\/p>\n