{"id":2856,"date":"2024-02-28T12:15:39","date_gmt":"2024-02-28T11:15:39","guid":{"rendered":"http:\/\/iypxhnp.cluster029.hosting.ovh.net\/index.php\/2024\/02\/28\/infostealer-le-logiciel-malveillant-en-vogue-en-2023\/"},"modified":"2024-02-28T12:15:39","modified_gmt":"2024-02-28T11:15:39","slug":"infostealer-le-logiciel-malveillant-en-vogue-en-2023","status":"publish","type":"post","link":"https:\/\/www.r2ie.org\/index.php\/2024\/02\/28\/infostealer-le-logiciel-malveillant-en-vogue-en-2023\/","title":{"rendered":"Infostealer, le logiciel malveillant en vogue en 2023\u00a0"},"content":{"rendered":"<p>Le 24 janvier dernier, le Clusif organisait la 24e \u00e9dition du Panorama de la Cybercriminalit\u00e9 2023. Utilisant toujours plus de nouvelles technologies pour mener leurs cyberattaques, les pirates se sont particuli\u00e8rement concentr\u00e9s sur le business florissant du vol d&rsquo;informations, l&rsquo;infostealer.<br \/>\nL\u2019article Infostealer, le logiciel malveillant en vogue en 2023\u00a0 est apparu en premier sur Portail de l&rsquo;IE.\u00a0<a href=\"https:\/\/www.portail-ie.fr\/univers\/risques-et-gouvernance-cyber\/2024\/infostealer-le-logiciel-malveillant-en-vogue-en-2023\/\" target=\"_blank\" class=\"feedzy-rss-link-icon\" rel=\"noopener\">Read More<\/a>\u00a0Portail de l&rsquo;IE\u00a0<\/p>\n<p>\u200b\u00a0\u00a0<\/p>\n<p>\u00a0<\/p>","protected":false},"excerpt":{"rendered":"<p>Le 24 janvier dernier, le Clusif organisait la 24e \u00e9dition du Panorama de la Cybercriminalit\u00e9 2023. Utilisant toujours plus de nouvelles technologies pour mener leurs cyberattaques, les pirates se sont particuli\u00e8rement concentr\u00e9s sur le business florissant du vol d&rsquo;informations, l&rsquo;infostealer. L\u2019article Infostealer, le logiciel malveillant en vogue en 2023\u00a0 est apparu en premier sur Portail&#8230;<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"footnotes":""},"categories":[12],"tags":[],"class_list":["post-2856","post","type-post","status-publish","format-standard","hentry","category-portail-de-lintelligence-economique"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Infostealer, le logiciel malveillant en vogue en 2023\u00a0 - Revue Internationale d&#039;Intelligence Economique<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.r2ie.org\/index.php\/2024\/02\/28\/infostealer-le-logiciel-malveillant-en-vogue-en-2023\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Infostealer, le logiciel malveillant en vogue en 2023\u00a0 - Revue Internationale d&#039;Intelligence Economique\" \/>\n<meta property=\"og:description\" content=\"Le 24 janvier dernier, le Clusif organisait la 24e \u00e9dition du Panorama de la Cybercriminalit\u00e9 2023. Utilisant toujours plus de nouvelles technologies pour mener leurs cyberattaques, les pirates se sont particuli\u00e8rement concentr\u00e9s sur le business florissant du vol d&rsquo;informations, l&rsquo;infostealer. L\u2019article Infostealer, le logiciel malveillant en vogue en 2023\u00a0 est apparu en premier sur Portail...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.r2ie.org\/index.php\/2024\/02\/28\/infostealer-le-logiciel-malveillant-en-vogue-en-2023\/\" \/>\n<meta property=\"og:site_name\" content=\"Revue Internationale d&#039;Intelligence Economique\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-28T11:15:39+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.r2ie.org\/index.php\/2024\/02\/28\/infostealer-le-logiciel-malveillant-en-vogue-en-2023\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.r2ie.org\/index.php\/2024\/02\/28\/infostealer-le-logiciel-malveillant-en-vogue-en-2023\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Infostealer, le logiciel malveillant en vogue en 2023\u00a0\",\"datePublished\":\"2024-02-28T11:15:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.r2ie.org\/index.php\/2024\/02\/28\/infostealer-le-logiciel-malveillant-en-vogue-en-2023\/\"},\"wordCount\":69,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.r2ie.org\/#organization\"},\"articleSection\":[\"Portail de l'intelligence \u00e9conomique\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.r2ie.org\/index.php\/2024\/02\/28\/infostealer-le-logiciel-malveillant-en-vogue-en-2023\/\",\"url\":\"https:\/\/www.r2ie.org\/index.php\/2024\/02\/28\/infostealer-le-logiciel-malveillant-en-vogue-en-2023\/\",\"name\":\"Infostealer, le logiciel malveillant en vogue en 2023\u00a0 - Revue Internationale d&#039;Intelligence Economique\",\"isPartOf\":{\"@id\":\"https:\/\/www.r2ie.org\/#website\"},\"datePublished\":\"2024-02-28T11:15:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.r2ie.org\/index.php\/2024\/02\/28\/infostealer-le-logiciel-malveillant-en-vogue-en-2023\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.r2ie.org\/index.php\/2024\/02\/28\/infostealer-le-logiciel-malveillant-en-vogue-en-2023\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.r2ie.org\/index.php\/2024\/02\/28\/infostealer-le-logiciel-malveillant-en-vogue-en-2023\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.r2ie.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infostealer, le logiciel malveillant en vogue en 2023\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.r2ie.org\/#website\",\"url\":\"https:\/\/www.r2ie.org\/\",\"name\":\"Revue Internationale d&#039;Intelligence Economique\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.r2ie.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.r2ie.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.r2ie.org\/#organization\",\"name\":\"Revue Internationale d&#039;Intelligence Economique\",\"url\":\"https:\/\/www.r2ie.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.r2ie.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.r2ie.org\/wp-content\/uploads\/2023\/01\/cropped-cropped-logo-r2ie-dc3a9gradc3a9.webp\",\"contentUrl\":\"https:\/\/www.r2ie.org\/wp-content\/uploads\/2023\/01\/cropped-cropped-logo-r2ie-dc3a9gradc3a9.webp\",\"width\":654,\"height\":251,\"caption\":\"Revue Internationale d&#039;Intelligence Economique\"},\"image\":{\"@id\":\"https:\/\/www.r2ie.org\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Infostealer, le logiciel malveillant en vogue en 2023\u00a0 - Revue Internationale d&#039;Intelligence Economique","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.r2ie.org\/index.php\/2024\/02\/28\/infostealer-le-logiciel-malveillant-en-vogue-en-2023\/","og_locale":"fr_FR","og_type":"article","og_title":"Infostealer, le logiciel malveillant en vogue en 2023\u00a0 - Revue Internationale d&#039;Intelligence Economique","og_description":"Le 24 janvier dernier, le Clusif organisait la 24e \u00e9dition du Panorama de la Cybercriminalit\u00e9 2023. Utilisant toujours plus de nouvelles technologies pour mener leurs cyberattaques, les pirates se sont particuli\u00e8rement concentr\u00e9s sur le business florissant du vol d&rsquo;informations, l&rsquo;infostealer. L\u2019article Infostealer, le logiciel malveillant en vogue en 2023\u00a0 est apparu en premier sur Portail...","og_url":"https:\/\/www.r2ie.org\/index.php\/2024\/02\/28\/infostealer-le-logiciel-malveillant-en-vogue-en-2023\/","og_site_name":"Revue Internationale d&#039;Intelligence Economique","article_published_time":"2024-02-28T11:15:39+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.r2ie.org\/index.php\/2024\/02\/28\/infostealer-le-logiciel-malveillant-en-vogue-en-2023\/#article","isPartOf":{"@id":"https:\/\/www.r2ie.org\/index.php\/2024\/02\/28\/infostealer-le-logiciel-malveillant-en-vogue-en-2023\/"},"author":{"name":"","@id":""},"headline":"Infostealer, le logiciel malveillant en vogue en 2023\u00a0","datePublished":"2024-02-28T11:15:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.r2ie.org\/index.php\/2024\/02\/28\/infostealer-le-logiciel-malveillant-en-vogue-en-2023\/"},"wordCount":69,"commentCount":0,"publisher":{"@id":"https:\/\/www.r2ie.org\/#organization"},"articleSection":["Portail de l'intelligence \u00e9conomique"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.r2ie.org\/index.php\/2024\/02\/28\/infostealer-le-logiciel-malveillant-en-vogue-en-2023\/","url":"https:\/\/www.r2ie.org\/index.php\/2024\/02\/28\/infostealer-le-logiciel-malveillant-en-vogue-en-2023\/","name":"Infostealer, le logiciel malveillant en vogue en 2023\u00a0 - Revue Internationale d&#039;Intelligence Economique","isPartOf":{"@id":"https:\/\/www.r2ie.org\/#website"},"datePublished":"2024-02-28T11:15:39+00:00","breadcrumb":{"@id":"https:\/\/www.r2ie.org\/index.php\/2024\/02\/28\/infostealer-le-logiciel-malveillant-en-vogue-en-2023\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.r2ie.org\/index.php\/2024\/02\/28\/infostealer-le-logiciel-malveillant-en-vogue-en-2023\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.r2ie.org\/index.php\/2024\/02\/28\/infostealer-le-logiciel-malveillant-en-vogue-en-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.r2ie.org\/"},{"@type":"ListItem","position":2,"name":"Infostealer, le logiciel malveillant en vogue en 2023\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.r2ie.org\/#website","url":"https:\/\/www.r2ie.org\/","name":"Revue Internationale d&#039;Intelligence Economique","description":"","publisher":{"@id":"https:\/\/www.r2ie.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.r2ie.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.r2ie.org\/#organization","name":"Revue Internationale d&#039;Intelligence Economique","url":"https:\/\/www.r2ie.org\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.r2ie.org\/#\/schema\/logo\/image\/","url":"https:\/\/www.r2ie.org\/wp-content\/uploads\/2023\/01\/cropped-cropped-logo-r2ie-dc3a9gradc3a9.webp","contentUrl":"https:\/\/www.r2ie.org\/wp-content\/uploads\/2023\/01\/cropped-cropped-logo-r2ie-dc3a9gradc3a9.webp","width":654,"height":251,"caption":"Revue Internationale d&#039;Intelligence Economique"},"image":{"@id":"https:\/\/www.r2ie.org\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.r2ie.org\/index.php\/wp-json\/wp\/v2\/posts\/2856","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.r2ie.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.r2ie.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/www.r2ie.org\/index.php\/wp-json\/wp\/v2\/comments?post=2856"}],"version-history":[{"count":0,"href":"https:\/\/www.r2ie.org\/index.php\/wp-json\/wp\/v2\/posts\/2856\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.r2ie.org\/index.php\/wp-json\/wp\/v2\/media?parent=2856"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.r2ie.org\/index.php\/wp-json\/wp\/v2\/categories?post=2856"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.r2ie.org\/index.php\/wp-json\/wp\/v2\/tags?post=2856"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}