{"id":1000,"date":"2016-11-07T14:20:10","date_gmt":"2016-11-07T13:20:10","guid":{"rendered":"https:\/\/dev.sicherheitsforum.ch\/?p=1000"},"modified":"2023-03-14T08:57:10","modified_gmt":"2023-03-14T07:57:10","slug":"achtung-support-betrueger","status":null,"type":"post","link":"https:\/\/news.save.ch\/fr\/achtung-support-betrueger\/","title":{"rendered":"Attention aux escrocs du support"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-1003\" src=\"https:\/\/sicherheitsforum.ch\/wp-content\/uploads\/2016\/12\/Achtung-Support-Betr\u00fcger-it-security.jpg\" alt=\"achtung-support-betrueger-it-security\" width=\"680\" height=\"401\" \/><\/p>\n<p>On conna\u00eet la chanson : un appelant venu d'Inde tente de vous convaincre que votre ordinateur est en panne et que vous devez absolument installer un logiciel. Cette arnaque n'est certes pas nouvelle, mais cette forme d'escroquerie est tr\u00e8s r\u00e9pandue. <a title=\"Guide G DATA : Qu&#039;est-ce que l&#039;ing\u00e9nierie sociale ?\" href=\"https:\/\/www.gdata.at\/ratgeber\/was-ist-eigentlich-ein-social-engineering\" target=\"_blank\" rel=\"noreferrer noopener\" data-cke-saved-href=\"https:\/\/www.gdata.at\/ratgeber\/was-ist-eigentlich-ein-social-engineering\">Ing\u00e9nierie sociale<\/a> est d'une actualit\u00e9 br\u00fblante.<\/p>\n<p>Une forme d'escroquerie au support technique que Microsoft ne met pas explicitement en \u00e9vidence dans son analyse est l'attaque par le ransomware Screenlocker. Les utilisateurs d'ordinateurs ne re\u00e7oivent pas d'appel ni d'e-mail, mais leur acc\u00e8s \u00e0 l'ordinateur est bloqu\u00e9 par un cheval de Troie de chantage. Les victimes doivent alors appeler un pr\u00e9tendu num\u00e9ro de t\u00e9l\u00e9phone Microsoft pour renouveler leur licence pr\u00e9tendument expir\u00e9e pour leur PC. Les experts de <a href=\"https:\/\/www.gdata.ch\" target=\"_blank\" rel=\"noreferrer noopener\" data-cke-saved-href=\"https:\/\/www.gdata.ch\">G Data <\/a>se sont pench\u00e9s de plus pr\u00e8s sur ce type d'escroquerie :<\/p>\n<p><strong>L'arnaque du ransomware Screenlocker<\/strong><\/p>\n<p>Le fichier malveillant se pr\u00e9sente toujours sous la forme d'un soi-disant programme d'installation pour un produit, par exemple VMC Media Player ou autre. Mais le programme annonc\u00e9 n'est pas du tout contenu dans cet installateur ! La famille de logiciels malveillants analys\u00e9e utilise Smart Install Maker pour g\u00e9n\u00e9rer l'installateur. L'analyse suivante de G Data se base sur le fichier suivant, qui s'est fait passer pour \"Free Download Manager\" : SHA256 : c72fb6e95375900999d14cd10541021a4db0a9065e387ed6b45266d80bb18d55<\/p>\n<p>Apr\u00e8s l'ex\u00e9cution, cet installateur place un fichier .bat et un fichier .exe (selon la variante, ceux-ci ont des noms diff\u00e9rents). Le fichier .exe est inscrit en tant que d\u00e9marrage automatique, aussi bien sous Winlogon Shell que sous l'entr\u00e9e de d\u00e9marrage automatique habituelle : SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run<\/p>\n<p><strong>Le fichier .bat<\/strong><\/p>\n<p>Le .bat contient du code batch qui red\u00e9marre l'ordinateur apr\u00e8s un certain d\u00e9lai.<\/p>\n<p><strong>Le fichier .exe<\/strong><\/p>\n<p>Il s'agit du code malveillant proprement dit, le verrou d'\u00e9cran. Dans notre exemple de cas, le fichier d'assemblage .NET s'appelle fatalerror.exe et n\u00e9cessite .NET 2.0 pour son ex\u00e9cution.<\/p>\n<p>G Data \u00e9crit qu'il a vu d'autres \u00e9chantillons n\u00e9cessitant .NET 4.6 pour s'ex\u00e9cuter. Si ces fichiers tombent sur Windows XP (o\u00f9 la version ne peut pas \u00eatre install\u00e9e) ou sur un syst\u00e8me avec une version .NET inf\u00e9rieure, le red\u00e9marrage effectu\u00e9 se traduit par un \u00e9cran vide qui n'affiche plus que son propre fond d'\u00e9cran Windows et le curseur de la souris.<\/p>\n<p>Il n'est toutefois pas possible de se connecter ou de lancer l'Explorateur Windows dans l'un ou l'autre cas.<\/p>\n<p>Les personnes concern\u00e9es voient s'afficher un \u00e9cran de verrouillage au design de Windows 10. Si l'on n'utilise pas Windows 10, on pourrait d\u00e9j\u00e0 remarquer \u00e0 ce stade que quelque chose ne va pas, comme l'\u00e9crit G-Data.<\/p>\n<p><strong>Conclusion<\/strong><\/p>\n<p>Les arnaques au support technique ne sont pas un ph\u00e9nom\u00e8ne nouveau. Vous ne recevrez \u00e0 aucun moment un appel honn\u00eate de Microsoft ou de ses partenaires vous demandant de payer pour une r\u00e9paration d'ordinateur.<\/p>\n<p>L'apparition accrue du ransomware Screenlocker a \u00e9t\u00e9 une \u00e9volution dans ce contexte et peut inqui\u00e9ter encore davantage les utilisateurs. D'autant plus qu'ici, un escroc ne signale pas de pr\u00e9tendus probl\u00e8mes sur l'ordinateur, mais bloque activement l'acc\u00e8s \u00e0 l'appareil. Il est donc malheureusement exclu d'ignorer les faux avertissements.<\/p>\n<p><strong>Conseils et astuces<\/strong><\/p>\n<ul>\n<li>Gardez \u00e0 l'esprit que le titre de \"partenaire Microsoft\" n'indique pas qu'une personne est particuli\u00e8rement digne de confiance. L'effort \u00e0 fournir pour s'enregistrer en tant que partenaire officiel Microsoft est relativement faible.<\/li>\n<li>N'accordez pas \u00e0 une personne d'assistance l'acc\u00e8s \u00e0 distance \u00e0 votre appareil, \u00e0 moins que vous ne soyez absolument certain qu'elle fournit un service l\u00e9gitime et que vous l'avez engag\u00e9e pour le faire.<\/li>\n<li>R\u00e9sistez \u00e0 la curiosit\u00e9 et ne vous laissez pas attirer par de pr\u00e9tendus collaborateurs du service d'assistance sur des pages web contenant des informations importantes. Ces pages web pourraient \u00eatre sp\u00e9cialement pr\u00e9par\u00e9es pour infecter les visiteurs avec des logiciels malveillants ou pour phisher des donn\u00e9es.<\/li>\n<li>Refusez l'aide par t\u00e9l\u00e9phone ou sur le site web si des frais inattendus vous sont factur\u00e9s. Ne communiquez pas vos donn\u00e9es de paiement (p. ex. les donn\u00e9es de votre carte de cr\u00e9dit) ou d'autres donn\u00e9es personnelles.<\/li>\n<li>Bien entendu : ne donnez jamais de mots de passe \u00e0 d'autres personnes !<\/li>\n<\/ul>\n<p><em>Source : G Data<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Das kennt man: Ein Anrufer aus Indien versucht Ihnen einzureden, dass ihr Rechner kaputt w\u00e4re und sie unbedingt eine Software installieren sollen. Diese Masche ist zwar nicht neu, aber diese Form des Social Engineering ist brandaktuell. Eine Form des Tech Support Scams, die Microsoft in seiner Analyse nicht explizit herausstellt, ist der Angriff mit Screenlocker [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":13675,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[3313],"tags":[96,62,63],"class_list":["post-1000","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalisierung","tag-cyber-crime","tag-ict-sicherheit","tag-it-security"],"acf":[],"hkrextid":null,"publication":null,"issue":null,"workflow":null,"startPage":null,"spitzmarke":null,"_posts_by_tag_page_fields":{"widget_title":"","widget_tags":""},"_at_widget":"1","_yoast_wpseo_primary_category":"2","_yoast_wpseo_focuskw_text_input":"Support-Betr\u00fcger","_yoast_wpseo_opengraph-image":"https:\/\/sicherheitsforum.ch\/wp-content\/uploads\/2016\/12\/Achtung-Support-Betr\u00fcger-it-security.jpg","_yoast_wpseo_opengraph-description":"Microsoft hat k\u00fcrzlich eine neue Studie vorgestellt. Die Zahlen zeigen, dass die bekanntesten Formen des Betrugs weiterhin verbreitet sind: Falsche Support-Angebote per Telefon, per E-Mail, per Pop-Up oder auch Umleitung beim Surfen im Web. Die IT-Security-Spezialistin G Data deckt eine weitere Art von Betrug mit angeblich technischem Support auf: Erpressertrojaner im Microsoft-Design!","_yoast_wpseo_opengraph-title":"Achtung Support-Betr\u00fcger","enclosure":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"_wp_old_slug":null,"_yoast_wpseo_title":null,"_yoast_wpseo_canonical":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Achtung Support-Betr\u00fcger - Save<\/title>\n<meta name=\"description\" content=\"Support-Betr\u00fcger: Falsche Support-Angebote per Telefon, per E-Mail, per Pop-Up oder auch Umleitung beim Surfen im Web.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.save.ch\/fr\/achtung-support-betrueger\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Achtung Support-Betr\u00fcger\" \/>\n<meta property=\"og:description\" content=\"Microsoft hat k\u00fcrzlich eine neue Studie vorgestellt. Die Zahlen zeigen, dass die bekanntesten Formen des Betrugs weiterhin verbreitet sind: Falsche Support-Angebote per Telefon, per E-Mail, per Pop-Up oder auch Umleitung beim Surfen im Web. Die IT-Security-Spezialistin G Data deckt eine weitere Art von Betrug mit angeblich technischem Support auf: Erpressertrojaner im Microsoft-Design!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.save.ch\/fr\/achtung-support-betrueger\/\" \/>\n<meta property=\"og:site_name\" content=\"Save\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-07T13:20:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-14T07:57:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sicherheitsforum.ch\/wp-content\/uploads\/2016\/12\/Achtung-Support-Betr\u00fcger-it-security.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/achtung-support-betrueger\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/achtung-support-betrueger\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d49e199490bad7c70d64b9ab51142f2b\"},\"headline\":\"Achtung Support-Betr\u00fcger\",\"datePublished\":\"2016-11-07T13:20:10+00:00\",\"dateModified\":\"2023-03-14T07:57:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/achtung-support-betrueger\\\/\"},\"wordCount\":612,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/achtung-support-betrueger\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Achtung-Support-Betrueger-it-security.jpg\",\"keywords\":[\"Cyber-Crime\",\"ICT-Sicherheit\",\"IT-SECURITY\"],\"articleSection\":[\"DIGITALISIERUNG\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/achtung-support-betrueger\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/achtung-support-betrueger\\\/\",\"name\":\"Achtung Support-Betr\u00fcger - Save\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/achtung-support-betrueger\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/achtung-support-betrueger\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Achtung-Support-Betrueger-it-security.jpg\",\"datePublished\":\"2016-11-07T13:20:10+00:00\",\"dateModified\":\"2023-03-14T07:57:10+00:00\",\"description\":\"Support-Betr\u00fcger: Falsche Support-Angebote per Telefon, per E-Mail, per Pop-Up oder auch Umleitung beim Surfen im Web.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/achtung-support-betrueger\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/news.save.ch\\\/achtung-support-betrueger\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/achtung-support-betrueger\\\/#primaryimage\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Achtung-Support-Betrueger-it-security.jpg\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Achtung-Support-Betrueger-it-security.jpg\",\"width\":889,\"height\":524},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/achtung-support-betrueger\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Achtung Support-Betr\u00fcger\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"name\":\"Save\",\"description\":\"Schweizer Fachzeitschrift f\u00fcr Sicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/news.save.ch\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\",\"name\":\"Sicherheitsforum\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"width\":1100,\"height\":91,\"caption\":\"Sicherheitsforum\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d49e199490bad7c70d64b9ab51142f2b\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/develop.organisator.galledia.ch\"],\"url\":\"https:\\\/\\\/news.save.ch\\\/fr\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Attention aux escrocs du support technique - Save","description":"Fraudes au support : fausses offres de support par t\u00e9l\u00e9phone, par e-mail, par pop-up ou m\u00eame par redirection lors de la navigation sur le web.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.save.ch\/fr\/achtung-support-betrueger\/","og_locale":"fr_FR","og_type":"article","og_title":"Achtung Support-Betr\u00fcger","og_description":"Microsoft hat k\u00fcrzlich eine neue Studie vorgestellt. Die Zahlen zeigen, dass die bekanntesten Formen des Betrugs weiterhin verbreitet sind: Falsche Support-Angebote per Telefon, per E-Mail, per Pop-Up oder auch Umleitung beim Surfen im Web. Die IT-Security-Spezialistin G Data deckt eine weitere Art von Betrug mit angeblich technischem Support auf: Erpressertrojaner im Microsoft-Design!","og_url":"https:\/\/news.save.ch\/fr\/achtung-support-betrueger\/","og_site_name":"Save","article_published_time":"2016-11-07T13:20:10+00:00","article_modified_time":"2023-03-14T07:57:10+00:00","og_image":[{"url":"https:\/\/sicherheitsforum.ch\/wp-content\/uploads\/2016\/12\/Achtung-Support-Betr\u00fcger-it-security.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"admin","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.save.ch\/achtung-support-betrueger\/#article","isPartOf":{"@id":"https:\/\/news.save.ch\/achtung-support-betrueger\/"},"author":{"name":"admin","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d49e199490bad7c70d64b9ab51142f2b"},"headline":"Achtung Support-Betr\u00fcger","datePublished":"2016-11-07T13:20:10+00:00","dateModified":"2023-03-14T07:57:10+00:00","mainEntityOfPage":{"@id":"https:\/\/news.save.ch\/achtung-support-betrueger\/"},"wordCount":612,"commentCount":0,"publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"image":{"@id":"https:\/\/news.save.ch\/achtung-support-betrueger\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Achtung-Support-Betrueger-it-security.jpg","keywords":["Cyber-Crime","ICT-Sicherheit","IT-SECURITY"],"articleSection":["DIGITALISIERUNG"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/news.save.ch\/achtung-support-betrueger\/","url":"https:\/\/news.save.ch\/achtung-support-betrueger\/","name":"Attention aux escrocs du support technique - Save","isPartOf":{"@id":"https:\/\/news.save.ch\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.save.ch\/achtung-support-betrueger\/#primaryimage"},"image":{"@id":"https:\/\/news.save.ch\/achtung-support-betrueger\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Achtung-Support-Betrueger-it-security.jpg","datePublished":"2016-11-07T13:20:10+00:00","dateModified":"2023-03-14T07:57:10+00:00","description":"Fraudes au support : fausses offres de support par t\u00e9l\u00e9phone, par e-mail, par pop-up ou m\u00eame par redirection lors de la navigation sur le web.","breadcrumb":{"@id":"https:\/\/news.save.ch\/achtung-support-betrueger\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.save.ch\/achtung-support-betrueger\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/news.save.ch\/achtung-support-betrueger\/#primaryimage","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Achtung-Support-Betrueger-it-security.jpg","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Achtung-Support-Betrueger-it-security.jpg","width":889,"height":524},{"@type":"BreadcrumbList","@id":"https:\/\/news.save.ch\/achtung-support-betrueger\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.save.ch\/de\/"},{"@type":"ListItem","position":2,"name":"Achtung Support-Betr\u00fcger"}]},{"@type":"WebSite","@id":"https:\/\/news.save.ch\/de\/#website","url":"https:\/\/news.save.ch\/de\/","name":"Save","description":"Revue suisse sp\u00e9cialis\u00e9e dans la s\u00e9curit\u00e9","publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.save.ch\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/news.save.ch\/de\/#organization","name":"Forum sur la s\u00e9curit\u00e9","url":"https:\/\/news.save.ch\/de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","width":1100,"height":91,"caption":"Sicherheitsforum"},"image":{"@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d49e199490bad7c70d64b9ab51142f2b","name":"admin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/develop.organisator.galledia.ch"],"url":"https:\/\/news.save.ch\/fr\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/1000","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/comments?post=1000"}],"version-history":[{"count":1,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/1000\/revisions"}],"predecessor-version":[{"id":17557,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/1000\/revisions\/17557"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/media\/13675"}],"wp:attachment":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/media?parent=1000"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/categories?post=1000"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/tags?post=1000"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}