{"id":211412,"date":"2025-03-26T06:19:52","date_gmt":"2025-03-26T13:19:52","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=211412"},"modified":"2025-03-26T06:19:52","modified_gmt":"2025-03-26T13:19:52","slug":"un-logiciel-malveillant-ciblant-android-se-fait-passer-pour-une-veritable-application","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/mobile-security\/un-logiciel-malveillant-ciblant-android-se-fait-passer-pour-une-veritable-application\/","title":{"rendered":"Un logiciel malveillant ciblant Android se fait passer pour une v\u00e9ritable application"},"content":{"rendered":"<p><span data-contrast=\"auto\">Les cybercriminels se montrent de plus en plus intelligents. Ils utilisent d\u00e9sormais une bo\u00eete \u00e0 outils de d\u00e9veloppement appel\u00e9e <\/span><b><span data-contrast=\"auto\">.NET MAUI<\/span><\/b><span data-contrast=\"auto\"> pour cr\u00e9er de fausses applications qui ressemblent \u00e0 s&#8217;y m\u00e9prendre \u00e0 des vraies\u00a0\u2014 applications bancaires ou de rencontre, ou encore plateformes de m\u00e9dias sociaux. Mais au lieu de vous aider, ces applications volent secr\u00e8tement vos renseignements personnels.<\/span><\/p>\n<p><span data-contrast=\"auto\">Vous trouverez ici l&#8217;<a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-android-malware-campaigns-evading-detection-using-cross-platform-framework-net-maui\">\u00e9tude compl\u00e8te de McAfee Labs<\/a>\u00a0:<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 data-start=\"1012\" data-end=\"1057\">Qu&#8217;est-ce que .NET MAUI et pourquoi devriez-vous vous en pr\u00e9occuper?<\/h2>\n<p><span data-contrast=\"auto\">NET MAUI est un outil utilis\u00e9 par les d\u00e9veloppeurs pour cr\u00e9er, \u00e0 partir du m\u00eame code, des applications pouvant fonctionner sur plusieurs appareils\u00a0\u2014 t\u00e9l\u00e9phones, tablettes et ordinateurs.<\/span><\/p>\n<p><span data-contrast=\"auto\">C&#8217;est un outil de choix pour les d\u00e9veloppeurs d&#8217;applications. Mais le probl\u00e8me est que les <\/span><b><span data-contrast=\"auto\">pirates informatiques s&#8217;en servent d\u00e9sormais aussi<\/span><\/b><span data-contrast=\"auto\">. Bien que McAfee soit en mesure de d\u00e9tecter les logiciels malveillants ainsi cr\u00e9\u00e9s, l&#8217;utilisation de .NET MAUI permet au code malveillant d&#8217;\u00e9chapper \u00e0 la plupart des logiciels antivirus. C&#8217;est un peu comme si un voleur portait une cape d&#8217;invisibilit\u00e9\u00a0: si vous ne regardez pas vraiment, vous ne le verrez pas.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 data-start=\"1522\" data-end=\"1554\">Comment ces applications frauduleuses font-elles pour vous pi\u00e9ger?<\/h2>\n<h3 data-start=\"1556\" data-end=\"1582\">1. <strong data-start=\"1563\" data-end=\"1582\">Elles donnent l&#8217;impression d&#8217;\u00eatre l\u00e9gitimes<\/strong><\/h3>\n<p><span data-contrast=\"auto\">Les pirates informatiques cr\u00e9ent des applications qui ressemblent \u00e0 s&#8217;y m\u00e9prendre \u00e0 celles d&#8217;entreprises r\u00e9elles. Par exemple, une fausse application se faisant passer pour <\/span><b><span data-contrast=\"auto\">IndusInd Bank<\/span><\/b><span data-contrast=\"auto\"> a demand\u00e9 aux utilisateurs d&#8217;entrer des renseignements sensibles tels que\u00a0:<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Nom complet<\/span><span data-ccp-props=\"{&quot;335559739&quot;:0}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Num\u00e9ro de t\u00e9l\u00e9phone<\/span><span data-ccp-props=\"{&quot;335559739&quot;:0}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Adresse courriel<\/span><span data-ccp-props=\"{&quot;335559739&quot;:0}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Date de naissance<\/span><span data-ccp-props=\"{&quot;335559739&quot;:0}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><span data-contrast=\"auto\">Donn\u00e9es de la carte de cr\u00e9dit<\/span><span data-ccp-props=\"{&quot;335559739&quot;:0}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"6\" data-aria-level=\"1\"><span data-contrast=\"auto\">Identifiants fiscaux et personnels uniques (PAN et Aadhaar)<\/span><span data-ccp-props=\"{&quot;335559739&quot;:0}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Une fois que vous cliquez sur \u00ab\u00a0Envoyer\u00a0\u00bb, ces renseignements sont directement transmis au serveur du pirate informatique.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p data-start=\"1837\" data-end=\"1905\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-211020 size-medium\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.51.30-PM-134x300.png\" alt=\"\" width=\"134\" height=\"300\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.51.30-PM-134x300.png 134w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.51.30-PM-457x1024.png 457w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.51.30-PM-58x129.png 58w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.51.30-PM.png 604w\" sizes=\"auto, (max-width: 134px) 100vw, 134px\" \/><\/p>\n<p style=\"text-align: center;\" data-start=\"1837\" data-end=\"1905\"><em><strong>Figure\u00a01. \u00c9cran de la fausse application IndusInd Bank demandant des renseignements \u00e0 l&#8217;utilisateur<\/strong> <\/em><\/p>\n<h3 data-start=\"1907\" data-end=\"1947\">2. <strong data-start=\"1914\" data-end=\"1947\">Elles dissimulent du code dangereux<\/strong><\/h3>\n<p data-start=\"1949\" data-end=\"2183\"><span class=\"TextRun SCXW221053218 BCX0\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW221053218 BCX0\">Les applications Android normales contiennent du code dans un <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW221053218 BCX0\">format que les outils de s\u00e9curit\u00e9<\/span><span class=\"NormalTextRun SCXW221053218 BCX0\"> peuvent analyser. Ces fausses applications <\/span><\/span><span class=\"TextRun MacChromeBold SCXW221053218 BCX0\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW221053218 BCX0\">dissimulent leur code malveillant dans des<\/span><span class=\"NormalTextRun SCXW221053218 BCX0\"> fichiers <\/span><span class=\"NormalTextRun SCXW221053218 BCX0\">binaires,<\/span><\/span><span class=\"TextRun SCXW221053218 BCX0\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW221053218 BCX0\"> de sorte que celui-ci <\/span><span class=\"NormalTextRun SCXW221053218 BCX0\">est<\/span><span class=\"NormalTextRun SCXW221053218 BCX0\"> plus difficile \u00e0 d\u00e9tecter. Elles peuvent ainsi persister plus longtemps sur votre t\u00e9l\u00e9phone et voler tranquillement des donn\u00e9es en arri\u00e8re-plan.<\/span><\/span><span class=\"EOP SCXW221053218 BCX0\" data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 data-start=\"2190\" data-end=\"2231\">Exemple de logiciel malveillant\u00a0: fausse application de m\u00e9dia social<\/h2>\n<p><span data-contrast=\"auto\">Dans un autre cas, les cybercriminels ont cr\u00e9\u00e9 une application qui se faisait passer pour une plateforme de m\u00e9dia social. Celle-ci <\/span><b><span data-contrast=\"auto\">ciblait les utilisateurs de langue chinoise<\/span><\/b><span data-contrast=\"auto\"> et \u00e9tait encore plus sournoise que la fausse application bancaire.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span> <span data-contrast=\"auto\">Voici ce qu&#8217;elle a r\u00e9ussi \u00e0 faire\u00a0:<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Voler les contacts, les photos et les textos<\/span><\/b><span data-contrast=\"auto\"> du t\u00e9l\u00e9phone<\/span><span data-ccp-props=\"{&quot;335559739&quot;:0}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Utiliser un <\/span><b><span data-contrast=\"auto\">processus en trois \u00e9tapes<\/span><\/b><span data-contrast=\"auto\"> pour dissimuler son code<\/span><span data-ccp-props=\"{&quot;335559739&quot;:0}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Chiffrer tout<\/span><\/b><span data-contrast=\"auto\"> afin d&#8217;\u00eatre plus difficile \u00e0 traquer<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Utiliser des <\/span><b><span data-contrast=\"auto\">autorisations d&#8217;applications bizarres et falsifi\u00e9es<\/span><\/b><span data-contrast=\"auto\"> pour tromper les dispositifs de s\u00e9curit\u00e9<\/span><span data-ccp-props=\"{&quot;335559739&quot;:0}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">De plus, au lieu d&#8217;utiliser le trafic Internet normal, l&#8217;application a envoy\u00e9 les donn\u00e9es vol\u00e9es via des canaux chiffr\u00e9s secrets, de sorte que m\u00eame si quelqu&#8217;un parvenait \u00e0 les intercepter, il \u00e9tait incapable de les lire.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p data-start=\"2650\" data-end=\"2808\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-211125\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.59.17-PM-1024x329.png\" alt=\"\" width=\"1024\" height=\"329\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.59.17-PM-1024x329.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.59.17-PM-300x96.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.59.17-PM-768x246.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.59.17-PM-1536x493.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.59.17-PM-205x66.png 205w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.59.17-PM.png 1776w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p style=\"text-align: center;\" data-start=\"2650\" data-end=\"2808\"><em><strong><span class=\"TextRun MacChromeBold SCXW202811841 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW202811841 BCX0\" data-ccp-parastyle=\"caption\">Figure\u00a02. Applications frauduleuses diverses utilisant la m\u00eame technique<\/span><\/span><\/strong><\/em><\/p>\n<h2 data-start=\"2815\" data-end=\"2851\">D&#8217;o\u00f9 viennent ces applications?<\/h2>\n<p data-start=\"2853\" data-end=\"2938\">Ces applications <strong data-start=\"2864\" data-end=\"2900\"><span style=\"text-decoration: underline;\">ne sont pas disponibles dans Google Play Store<\/span>,<\/strong> mais sont distribu\u00e9es par les pirates informatiques par diff\u00e9rents moyens\u00a0:<\/p>\n<ul data-start=\"2940\" data-end=\"3012\">\n<li data-start=\"2940\" data-end=\"2955\">Faux sites Web<\/li>\n<li data-start=\"2956\" data-end=\"2972\">Applications de messagerie<\/li>\n<li data-start=\"2973\" data-end=\"3012\">Liens douteux dans des textos ou des groupes de discussion<\/li>\n<\/ul>\n<p data-start=\"3014\" data-end=\"3115\">Par cons\u00e9quent, si quelqu&#8217;un vous envoie un lien vers une nouvelle application g\u00e9niale qui ne provient pas de Play Store, <strong data-start=\"3094\" data-end=\"3115\">soyez extr\u00eamement prudent<\/strong>.<\/p>\n<h2 data-start=\"3122\" data-end=\"3148\">Comment vous prot\u00e9ger?<\/h2>\n<p data-start=\"3150\" data-end=\"3188\">Voici quelques mesures simples pour rester en s\u00e9curit\u00e9\u00a0:<\/p>\n<ul>\n<li data-start=\"3190\" data-end=\"3654\"><strong data-start=\"3192\" data-end=\"3239\">T\u00e9l\u00e9chargez des applications uniquement sur des boutiques d&#8217;applications officielles<\/strong>, telles que Google Play ou l&#8217;Apple App Store.<\/li>\n<li data-start=\"3190\" data-end=\"3654\"><strong data-start=\"3284\" data-end=\"3347\">\u00c9vitez de cliquer sur des liens provenant d&#8217;inconnus ou de sources non fiables.<\/strong><\/li>\n<li data-start=\"3190\" data-end=\"3654\"><strong data-start=\"3352\" data-end=\"3381\">Installez un logiciel de s\u00e9curit\u00e9<\/strong> tel que <a href=\"https:\/\/www.mcafee.com\/fr-ca\/identity-theft\/protection.html?path=blogs\" target=\"_new\" rel=\"noopener\" data-start=\"3387\" data-end=\"3449\">McAfee+<\/a> pour d\u00e9tecter les menaces en temps r\u00e9el.<\/li>\n<li data-start=\"3190\" data-end=\"3654\"><strong data-start=\"3484\" data-end=\"3523\">Maintenez vos applications et logiciels \u00e0 jour<\/strong>\u00a0\u2014 les mises \u00e0 jour corrigent souvent des failles de s\u00e9curit\u00e9.<\/li>\n<li data-start=\"3190\" data-end=\"3654\"><strong data-start=\"3561\" data-end=\"3586\">V\u00e9rifiez les autorisations des applications<\/strong>\u00a0\u2014 si une application de lampe de poche tente d&#8217;acc\u00e9der \u00e0 vos textos, c&#8217;est un signal d&#8217;alerte.<\/li>\n<\/ul>\n<p data-start=\"3700\" data-end=\"3836\">Les pirates informatiques font preuve de plus en plus de cr\u00e9ativit\u00e9, mais vous pouvez garder une longueur d&#8217;avance. Ces nouvelles menaces bas\u00e9es sur .NET MAUI sont sournoises, mais ne sont pas imparables.<\/p>\n<p data-start=\"3838\" data-end=\"3929\">En adoptant des comportements intelligents et en utilisant les bons outils, vous pouvez prot\u00e9ger votre t\u00e9l\u00e9phone et vos renseignements personnels. <strong data-start=\"3936\" data-end=\"3980\">Vous souhaitez b\u00e9n\u00e9ficier d&#8217;une protection en temps r\u00e9el sur votre t\u00e9l\u00e9phone? <\/strong><a href=\"https:\/\/www.mcafee.com\/fr-ca\/identity-theft\/protection.html?path=blogs\" target=\"_new\" rel=\"noopener\" data-start=\"3983\" data-end=\"4054\">T\u00e9l\u00e9chargez McAfee+<\/a> et gardez une longueur d&#8217;avance sur les derni\u00e8res menaces.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les cybercriminels se montrent de plus en plus intelligents. Ils utilisent d\u00e9sormais une bo\u00eete \u00e0 outils de d\u00e9veloppement appel\u00e9e .NET&#8230;<\/p>\n","protected":false},"author":1440,"featured_media":159132,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[13861],"tags":[],"coauthors":[15735],"class_list":["post-211412","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Un logiciel malveillant ciblant Android se fait passer pour une v\u00e9ritable application | Blog McAfee<\/title>\n<meta name=\"description\" content=\"Les cybercriminels utilisent d\u00e9sormais une bo\u00eete \u00e0 outils de d\u00e9veloppement appel\u00e9e .NET MAUI pour cr\u00e9er de fausses applications.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Un logiciel malveillant ciblant Android se fait passer pour une v\u00e9ritable application | Blog McAfee\" \/>\n<meta property=\"og:description\" content=\"Les cybercriminels utilisent d\u00e9sormais une bo\u00eete \u00e0 outils de d\u00e9veloppement appel\u00e9e .NET MAUI pour cr\u00e9er de fausses applications.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/mobile-security\/un-logiciel-malveillant-ciblant-android-se-fait-passer-pour-une-veritable-application\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog McAfee\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-26T13:19:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/300x200_Blog_phonetracking.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jasdev Dhaliwal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jasdev Dhaliwal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/mobile-security\/un-logiciel-malveillant-ciblant-android-se-fait-passer-pour-une-veritable-application\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/mobile-security\/un-logiciel-malveillant-ciblant-android-se-fait-passer-pour-une-veritable-application\/\"},\"author\":{\"name\":\"Brooke Seipel\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#\/schema\/person\/e0177129df164a74082f47397af3e729\"},\"headline\":\"Un logiciel malveillant ciblant Android se fait passer pour une v\u00e9ritable application\",\"datePublished\":\"2025-03-26T13:19:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/mobile-security\/un-logiciel-malveillant-ciblant-android-se-fait-passer-pour-une-veritable-application\/\"},\"wordCount\":811,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/mobile-security\/un-logiciel-malveillant-ciblant-android-se-fait-passer-pour-une-veritable-application\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/300x200_Blog_phonetracking.jpg\",\"articleSection\":[\"S\u00e9curit\u00e9 pour appareil mobile\"],\"inLanguage\":\"fr-CA\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/mobile-security\/un-logiciel-malveillant-ciblant-android-se-fait-passer-pour-une-veritable-application\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/mobile-security\/un-logiciel-malveillant-ciblant-android-se-fait-passer-pour-une-veritable-application\/\",\"name\":\"Un logiciel malveillant ciblant Android se fait passer pour une v\u00e9ritable application | Blog McAfee\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/mobile-security\/un-logiciel-malveillant-ciblant-android-se-fait-passer-pour-une-veritable-application\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/mobile-security\/un-logiciel-malveillant-ciblant-android-se-fait-passer-pour-une-veritable-application\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/300x200_Blog_phonetracking.jpg\",\"datePublished\":\"2025-03-26T13:19:52+00:00\",\"description\":\"Les cybercriminels utilisent d\u00e9sormais une bo\u00eete \u00e0 outils de d\u00e9veloppement appel\u00e9e .NET MAUI pour cr\u00e9er de fausses applications.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/mobile-security\/un-logiciel-malveillant-ciblant-android-se-fait-passer-pour-une-veritable-application\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/mobile-security\/un-logiciel-malveillant-ciblant-android-se-fait-passer-pour-une-veritable-application\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/mobile-security\/un-logiciel-malveillant-ciblant-android-se-fait-passer-pour-une-veritable-application\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/300x200_Blog_phonetracking.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/300x200_Blog_phonetracking.jpg\",\"width\":300,\"height\":200,\"caption\":\"adolescenti e telefono\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/mobile-security\/un-logiciel-malveillant-ciblant-android-se-fait-passer-pour-une-veritable-application\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e9curit\u00e9 pour appareil mobile\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/mobile-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Un logiciel malveillant ciblant Android se fait passer pour une v\u00e9ritable application\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/\",\"name\":\"Blog McAfee\",\"description\":\"Actualit\u00e9s concernant la s\u00e9curit\u00e9 Internet\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#\/schema\/person\/e0177129df164a74082f47397af3e729\",\"name\":\"Brooke Seipel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#\/schema\/person\/image\/ac03c1083bbdcd2cbb0675dc29c62cbe\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg\",\"caption\":\"Brooke Seipel\"},\"description\":\"Brooke Seipel is the Content Editor in Chief at McAfee, where she leads the company's content strategy with a focus on cybersecurity education. With a decade of experience in audience development and digital content, Brooke has a strong understanding of online audiences, emerging trends, and the evolving cyber landscape. Before joining McAfee, Brooke led audience teams and served as both a reporter and editor at numerous award-winning publications including Fortune, The Hill, International Business Times, New Republic, and The OC Register. Brooke is dedicated to providing insightful, actionable content that empowers readers to make informed decisions about their digital safety. When she's not immersed in the world of cybersecurity, you can find her scrolling social media endlessly, soaking up the latest trends, and also volunteering as a naturalist.\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/author\/brooke-seipel\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Un logiciel malveillant ciblant Android se fait passer pour une v\u00e9ritable application | Blog McAfee","description":"Les cybercriminels utilisent d\u00e9sormais une bo\u00eete \u00e0 outils de d\u00e9veloppement appel\u00e9e .NET MAUI pour cr\u00e9er de fausses applications.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"fr_CA","og_type":"article","og_title":"Un logiciel malveillant ciblant Android se fait passer pour une v\u00e9ritable application | Blog McAfee","og_description":"Les cybercriminels utilisent d\u00e9sormais une bo\u00eete \u00e0 outils de d\u00e9veloppement appel\u00e9e .NET MAUI pour cr\u00e9er de fausses applications.","og_url":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/mobile-security\/un-logiciel-malveillant-ciblant-android-se-fait-passer-pour-une-veritable-application\/","og_site_name":"Blog McAfee","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2025-03-26T13:19:52+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/300x200_Blog_phonetracking.jpg","type":"image\/jpeg"}],"author":"Jasdev Dhaliwal","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Jasdev Dhaliwal","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/mobile-security\/un-logiciel-malveillant-ciblant-android-se-fait-passer-pour-une-veritable-application\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/mobile-security\/un-logiciel-malveillant-ciblant-android-se-fait-passer-pour-une-veritable-application\/"},"author":{"name":"Brooke Seipel","@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#\/schema\/person\/e0177129df164a74082f47397af3e729"},"headline":"Un logiciel malveillant ciblant Android se fait passer pour une v\u00e9ritable application","datePublished":"2025-03-26T13:19:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/mobile-security\/un-logiciel-malveillant-ciblant-android-se-fait-passer-pour-une-veritable-application\/"},"wordCount":811,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/mobile-security\/un-logiciel-malveillant-ciblant-android-se-fait-passer-pour-une-veritable-application\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/300x200_Blog_phonetracking.jpg","articleSection":["S\u00e9curit\u00e9 pour appareil mobile"],"inLanguage":"fr-CA"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/mobile-security\/un-logiciel-malveillant-ciblant-android-se-fait-passer-pour-une-veritable-application\/","url":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/mobile-security\/un-logiciel-malveillant-ciblant-android-se-fait-passer-pour-une-veritable-application\/","name":"Un logiciel malveillant ciblant Android se fait passer pour une v\u00e9ritable application | Blog McAfee","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/mobile-security\/un-logiciel-malveillant-ciblant-android-se-fait-passer-pour-une-veritable-application\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/mobile-security\/un-logiciel-malveillant-ciblant-android-se-fait-passer-pour-une-veritable-application\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/300x200_Blog_phonetracking.jpg","datePublished":"2025-03-26T13:19:52+00:00","description":"Les cybercriminels utilisent d\u00e9sormais une bo\u00eete \u00e0 outils de d\u00e9veloppement appel\u00e9e .NET MAUI pour cr\u00e9er de fausses applications.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/mobile-security\/un-logiciel-malveillant-ciblant-android-se-fait-passer-pour-une-veritable-application\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/fr-ca\/mobile-security\/un-logiciel-malveillant-ciblant-android-se-fait-passer-pour-une-veritable-application\/"]}]},{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/mobile-security\/un-logiciel-malveillant-ciblant-android-se-fait-passer-pour-une-veritable-application\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/300x200_Blog_phonetracking.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/300x200_Blog_phonetracking.jpg","width":300,"height":200,"caption":"adolescenti e telefono"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/mobile-security\/un-logiciel-malveillant-ciblant-android-se-fait-passer-pour-une-veritable-application\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9 pour appareil mobile","item":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/mobile-security\/"},{"@type":"ListItem","position":3,"name":"Un logiciel malveillant ciblant Android se fait passer pour une v\u00e9ritable application"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#website","url":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/","name":"Blog McAfee","description":"Actualit\u00e9s concernant la s\u00e9curit\u00e9 Internet","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-CA"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/","logo":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#\/schema\/person\/e0177129df164a74082f47397af3e729","name":"Brooke Seipel","image":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#\/schema\/person\/image\/ac03c1083bbdcd2cbb0675dc29c62cbe","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg","caption":"Brooke Seipel"},"description":"Brooke Seipel is the Content Editor in Chief at McAfee, where she leads the company's content strategy with a focus on cybersecurity education. With a decade of experience in audience development and digital content, Brooke has a strong understanding of online audiences, emerging trends, and the evolving cyber landscape. Before joining McAfee, Brooke led audience teams and served as both a reporter and editor at numerous award-winning publications including Fortune, The Hill, International Business Times, New Republic, and The OC Register. Brooke is dedicated to providing insightful, actionable content that empowers readers to make informed decisions about their digital safety. When she's not immersed in the world of cybersecurity, you can find her scrolling social media endlessly, soaking up the latest trends, and also volunteering as a naturalist.","url":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/author\/brooke-seipel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/posts\/211412","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/users\/1440"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/comments?post=211412"}],"version-history":[{"count":4,"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/posts\/211412\/revisions"}],"predecessor-version":[{"id":211426,"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/posts\/211412\/revisions\/211426"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/media\/159132"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/media?parent=211412"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/categories?post=211412"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/tags?post=211412"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/coauthors?post=211412"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}