{"id":223182,"date":"2025-10-22T04:10:48","date_gmt":"2025-10-22T11:10:48","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=223182"},"modified":"2025-10-22T04:35:20","modified_gmt":"2025-10-22T11:35:20","slug":"des-pirates-amenent-de-grandes-entreprises-a-exposer-des-donnees-salesforce-decouvrez-si-vous-etes-concerne","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/des-pirates-amenent-de-grandes-entreprises-a-exposer-des-donnees-salesforce-decouvrez-si-vous-etes-concerne\/","title":{"rendered":"Des pirates am\u00e8nent des employ\u00e9s de grandes entreprises \u00e0 exposer des donn\u00e9es Salesforce"},"content":{"rendered":"<p><span data-contrast=\"auto\">Des cybercriminels ont amen\u00e9 des employ\u00e9s de grandes entreprises internationales \u00e0 leur donner acc\u00e8s \u00e0 Salesforce et ont utilis\u00e9 cet acc\u00e8s pour voler des millions de dossiers clients.<\/span><\/p>\n<p><span data-contrast=\"auto\">Dans cet article, McAfee fait le point sur l&#8217;attaque, les informations qui ont \u00e9t\u00e9 divulgu\u00e9es et ce que vous devez savoir pour prot\u00e9ger vos donn\u00e9es et votre identit\u00e9.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Les faits<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Les pirates informatiques affirment avoir vol\u00e9 les donn\u00e9es clients de plusieurs grandes entreprises, dont des marques bien connues comme Adidas, Cisco, Disney, Google, IKEA, Pandora, Toyota et Vietnam Airlines. <\/span>Tout au long de l&#8217;ann\u00e9e\u00a02025, <a href=\"https:\/\/www.securityweek.com\/hackers-extorting-salesforce-after-stealing-data-from-dozens-of-customers\/\"><span data-contrast=\"none\">Security Week<\/span><\/a><span data-contrast=\"auto\"> a fait \u00e9tat d&#8217;une vague d&#8217;attaques par ing\u00e9nierie sociale exploitant des vuln\u00e9rabilit\u00e9s humaines\u00a0\u2013plut\u00f4t que li\u00e9es aux plateformes.<\/span><\/p>\n<p><span data-contrast=\"auto\">Selon <\/span><a href=\"https:\/\/www.wsj.com\/articles\/salesforce-linked-security-breach-fallout-escalates-with-qantas-leak-e42913fd?gaa_at=eafs&amp;gaa_n=AWEtsqdKXqgrnK3NcZnA0IaqpnFyKJ5A4LbqjF5VKBJ0qJhYQJLSuQq7jVM1kq69qCo%3D&amp;gaa_ts=68efe567&amp;gaa_sig=yaGAtCSaLQs2HndWG04jIVq3hZFfjSCHbtMbhA3k4YyaMTnL_wh-BgfkbipO5_a9xsqxi9kKRm-fW0SFt4S02A%3D%3D\"><span data-contrast=\"none\">The Wall Street Journal<\/span><\/a><span data-contrast=\"auto\">, le groupe de pirates informatiques a d\u00e9j\u00e0 divulgu\u00e9 des millions de dossiers clients de Qantas Airlines et menace d&#8217;exposer les informations d&#8217;autres entreprises.<\/span><\/p>\n<p><span data-contrast=\"auto\">Ces donn\u00e9es <\/span><a href=\"https:\/\/www.wsj.com\/articles\/salesforce-linked-security-breach-fallout-escalates-with-qantas-leak-e42913fd?gaa_at=eafs&amp;gaa_n=AWEtsqdKXqgrnK3NcZnA0IaqpnFyKJ5A4LbqjF5VKBJ0qJhYQJLSuQq7jVM1kq69qCo%3D&amp;gaa_ts=68efe567&amp;gaa_sig=yaGAtCSaLQs2HndWG04jIVq3hZFfjSCHbtMbhA3k4YyaMTnL_wh-BgfkbipO5_a9xsqxi9kKRm-fW0SFt4S02A%3D%3D\"><span data-contrast=\"none\">incluraient<\/span><\/a> <b><span data-contrast=\"auto\">des noms, des adresses e-mail, des num\u00e9ros de t\u00e9l\u00e9phone, des dates de naissance<\/span><\/b><span data-contrast=\"auto\"> et des <\/span><b><span data-contrast=\"auto\">d\u00e9tails concernant les programmes de fid\u00e9lit\u00e9<\/span><\/b><span data-contrast=\"auto\">. Bien qu&#8217;aucune donn\u00e9e financi\u00e8re ne semble concern\u00e9e, les informations personnelles de ce type peuvent \u00eatre exploit\u00e9es dans le cadre de campagnes de phishing et d&#8217;escroquerie.<\/span><\/p>\n<p><span data-contrast=\"auto\">Salesforce a publi\u00e9 plusieurs alertes insistant sur le fait que ces attaques sont dues \u00e0 des vols d&#8217;identifiants et \u00e0 des applications connect\u00e9es malveillantes, et non \u00e0 une compromission de son infrastructure.<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Malheureusement, les incidents de ce type ne sont pas rares et ne se limitent pas \u00e0 une plateforme ou un secteur d&#8217;activit\u00e9 unique. <\/span><\/b><span data-contrast=\"auto\">M\u00eame les entreprises les plus aguerries peuvent \u00eatre victimes de pirates informatiques recourant \u00e0 l&#8217;ing\u00e9nierie sociale et \u00e0 la manipulation pour infiltrer les syst\u00e8mes s\u00e9curis\u00e9s.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"3\"><b><span data-contrast=\"none\">Modus operandi<\/span><\/b><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:281,&quot;335559739&quot;:281}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Les pirates auraient contact\u00e9 par t\u00e9l\u00e9phone les employ\u00e9s de diverses entreprises en se faisant passer pour des membres du support informatique\u00a0\u2014 une tactique connue sous le nom de <\/span><b><span data-contrast=\"auto\">\u00ab\u00a0vishing\u00a0\u00bb<\/span><\/b><span data-contrast=\"auto\">\u00a0\u2014 et les auraient convaincus de partager leurs identifiants de connexion ou de se connecter \u00e0 de faux outils tiers, remettant ainsi les cl\u00e9s de leurs comptes aux cybercriminels. Une fois \u00e0 l&#8217;int\u00e9rieur, ceux-ci ont acc\u00e9d\u00e9 aux bases de donn\u00e9es clients afin de voler les informations stock\u00e9es.<\/span><\/p>\n<p><span data-contrast=\"auto\">Ce mode op\u00e9ratoire s&#8217;apparente davantage \u00e0 une personne incit\u00e9e \u00e0 ouvrir la porte par la ruse qu&#8217;\u00e0 un cambrioleur qui forcerait une serrure.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"3\"><b><span data-contrast=\"none\">Donn\u00e9es divulgu\u00e9es<\/span><\/b><\/h2>\n<p><span data-contrast=\"auto\">Les donn\u00e9es divulgu\u00e9es \u00e0 ce jour sont les suivantes\u00a0:<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Noms et adresses e-mail<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Num\u00e9ros de t\u00e9l\u00e9phone<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Dates de naissance<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Adresses priv\u00e9es ou postales<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Num\u00e9ro de cartes de fid\u00e9lit\u00e9 ou de voyageurs r\u00e9guliers<\/span><\/li>\n<\/ul>\n<p><b><span data-contrast=\"auto\">Rien n&#8217;indique la pr\u00e9sence de donn\u00e9es bancaires ou de cartes de cr\u00e9dit<\/span><\/b><span data-contrast=\"auto\"> dans les fuites confirm\u00e9es, mais cela ne signifie pas que vous \u00eates \u00e0 l&#8217;abri.\u00a0<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"3\"><b><span data-contrast=\"none\">Pourquoi cette affaire vous concerne-t-elle\u00a0?<\/span><\/b><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:281,&quot;335559739&quot;:281}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">M\u00eame si vos informations financi\u00e8res ne sont pas expos\u00e9es lors d&#8217;une violation de donn\u00e9es, des donn\u00e9es personnelles telles que votre nom et votre adresse peuvent toujours \u00eatre utilis\u00e9es dans le cadre d&#8217;<\/span><b><span data-contrast=\"auto\">escroqueries cibl\u00e9es et d&#8217;attaques de phishing<\/span><\/b><span data-contrast=\"auto\">. Lorsque de telles informations sont vol\u00e9es et vendues en ligne, les escrocs les utilisent \u00e0 diverses fins\u00a0:<\/span><\/p>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Envoyer des e-mails ou des SMS de phishing r\u00e9alistes contenant des d\u00e9tails r\u00e9els vous concernant<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Essayer de se connecter \u00e0 vos autres comptes si vous r\u00e9utilisez constamment les m\u00eames mots de passe<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Lancer des escroqueries de type \u00ab\u00a0remboursement\u00a0\u00bb ou \u00ab\u00a0v\u00e9rification de compte\u00a0\u00bb li\u00e9es \u00e0 des marques en lesquelles vous avez confiance<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">M\u00eame si vos donn\u00e9es ne sont pas concern\u00e9es par cette fuite sp\u00e9cifique, <\/span><b><span data-contrast=\"auto\">ces attaques mettent en \u00e9vidence la fr\u00e9quence \u00e0 laquelle vos informations transitent par des syst\u00e8mes tiers sur lesquels vous n&#8217;avez aucun contr\u00f4le<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"3\"><b><span data-contrast=\"none\">Comment savoir si vous \u00eates concern\u00e9\u00a0?<\/span><\/b><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/h2>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Consultez votre bo\u00eete de r\u00e9ception\u00a0\u2014<\/span><\/b><span data-contrast=\"auto\"> Si vous \u00eates membre ou client d&#8217;une des entreprises cit\u00e9es, surveillez les notifications officielles.\u00a0<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Utilisez un site fiable de v\u00e9rification des donn\u00e9es compromises\u00a0\u2014<\/span><\/b><span data-contrast=\"auto\"> Visitez le site <\/span><a href=\"https:\/\/haveibeenpwned.com\/\"><span data-contrast=\"none\">Have I Been Pwned<\/span><\/a><span data-contrast=\"auto\"> ou connectez-vous \u00e0 votre compte McAfee pour v\u00e9rifier si votre adresse e-mail a \u00e9t\u00e9 compromise lors de violations r\u00e9centes. Vous pouvez \u00e9galement souscrire un abonnement \u00e0 l&#8217;<\/span><a href=\"https:\/\/www.mcafee.com\/fr-fr\/antivirus.html\"><span data-contrast=\"none\">antivirus McAfee<\/span><\/a><span data-contrast=\"auto\"> pour prot\u00e9ger vos appareils.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">\u00c9vitez les services de recherche sur le Dark Web\u00a0\u2014<\/span><\/b><span data-contrast=\"auto\"> Certains d&#8217;entre eux sont eux-m\u00eames des escroqueries. Tenez-vous-en \u00e0 des sources l\u00e9gitimes.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<h2 aria-level=\"3\"><b><span data-contrast=\"none\">Mesures \u00e0 prendre d\u00e8s \u00e0 pr\u00e9sent<\/span><\/b><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:281,&quot;335559739&quot;:281}\">\u00a0<\/span><\/h2>\n<p><b><span data-contrast=\"auto\">1) Changez vos mots de passe\u00a0\u2014 aujourd&#8217;hui encore.<\/span><\/b><\/p>\n<p><span data-contrast=\"auto\">Utilisez des mots de passe complexes et uniques pour chaque compte. Le gestionnaire de mots de passe de McAfee peut vous y aider. <\/span><a href=\"https:\/\/www.mcafee.com\/fr-fr\/password-generator.html\"><span data-contrast=\"none\">Testez notre g\u00e9n\u00e9rateur de mots de passe al\u00e9atoires.<\/span><\/a><\/p>\n<p><b><span data-contrast=\"auto\">2) Activez l&#8217;authentification \u00e0 deux facteurs (2FA).<\/span><\/b><\/p>\n<p><span data-contrast=\"auto\">M\u00eame si un pirate dispose de votre mot de passe, il ne pourra pas entrer sans votre code.<\/span><\/p>\n<p><b><span data-contrast=\"auto\">3) Surveillez vos comptes financiers et de fid\u00e9lit\u00e9.<\/span><\/b><\/p>\n<p><span data-contrast=\"auto\">Soyez attentifs aux frais inhabituels, aux remboursements ou aux e-mails de r\u00e9initialisation de mot de passe que vous n&#8217;avez pas sollicit\u00e9s.<\/span><\/p>\n<p><b><span data-contrast=\"auto\">4) Bloquez votre cr\u00e9dit.<\/span><\/b><\/p>\n<p><span data-contrast=\"auto\">Cette op\u00e9ration est gratuite et emp\u00eache l&#8217;ouverture de nouveaux comptes \u00e0 votre nom. En outre, vous pouvez lever le blocage \u00e0 tout moment. Les utilisateurs de McAfee peuvent <\/span><a href=\"https:\/\/www.mcafee.com\/learn\/security-freeze\/\"><span data-contrast=\"none\">appliquer un \u00ab\u00a0blocage de s\u00e9curit\u00e9\u00a0\u00bb<\/span><\/a><span data-contrast=\"auto\"> pour b\u00e9n\u00e9ficier d&#8217;une protection suppl\u00e9mentaire.<\/span><\/p>\n<p><b><span data-contrast=\"auto\">5) Soyez tr\u00e8s prudent lorsque vous recevez des e-mails ou des appels concernant une \u00ab\u00a0violation\u00a0\u00bb.<\/span><\/b><\/p>\n<p><span data-contrast=\"auto\">Les escrocs se font souvent passer pour des collaborateurs des entreprises concern\u00e9es pour \u00ab vous aider \u00e0 s\u00e9curiser votre compte \u00bb. Ne cliquez sur aucun lien et ne communiquez aucune information par t\u00e9l\u00e9phone. Acc\u00e9dez directement au site Web ou \u00e0 l&#8217;application de l&#8217;entreprise ou contactez votre propre \u00e9quipe informatique si une violation se produit sur votre lieu de travail.<\/span><\/p>\n<p><b><span data-contrast=\"auto\">6) Envisagez l&#8217;acquisition d&#8217;une fonctionnalit\u00e9 de protection de l&#8217;identit\u00e9.<\/span><\/b><\/p>\n<p>La fonction de <a href=\"https:\/\/www.mcafee.com\/learn\/fr\/surveillance-de-l-identite\/\"><span data-contrast=\"none\">surveillance de l&#8217;identit\u00e9 int\u00e9gr\u00e9e de McAfee<\/span><\/a><span data-contrast=\"auto\"> recherche vos informations personnelles sur le Dark Web, vous envoie une alerte si elles apparaissent dans le cadre d&#8217;une violation et comprend une couverture allant jusqu&#8217;\u00e0 1\u00a0million de dollars pour les frais de restauration de l&#8217;identit\u00e9.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span> <span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"3\"><b><span data-contrast=\"none\">\u00c0 quels types d&#8217;escroqueries s&#8217;attendre \u00e0 l&#8217;avenir\u00a0?<\/span><\/b><\/h2>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Fausses offres de remboursement ou d&#8217;indemnisation.<\/span><\/b><span data-contrast=\"auto\"> \u00ab\u00a0Nous avons constat\u00e9 que votre compte avait \u00e9t\u00e9 impact\u00e9. Demandez votre remboursement ici.\u00a0\u00bb Ne cliquez pas.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Phishing li\u00e9 aux points de fid\u00e9lit\u00e9.<\/span><\/b><span data-contrast=\"auto\"> Des e-mails semblant provenir d&#8217;une compagnie a\u00e9rienne ou d&#8217;un d\u00e9taillant vous invitent \u00e0 vous connecter pour \u00ab\u00a0prot\u00e9ger les points engrang\u00e9s\u00a0\u00bb.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Escroqueries bas\u00e9es sur la baisse de vigilance engendr\u00e9e par des demandes r\u00e9p\u00e9t\u00e9es d&#8217;authentification multifacteur.<\/span><\/b><span data-contrast=\"auto\"> Les pirates informatiques envoient des codes de connexion \u00e0 r\u00e9p\u00e9tition afin de susciter un sentiment de lassitude, puis vous appellent en se faisant passer pour le service d&#8217;assistance et vous demandent d&#8217;en lire un \u00e0 haute voix. Ne le faites surtout pas.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">En qu\u00eate d&#8217;une protection continue\u00a0?<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Il est tout \u00e0 fait possible que vos donn\u00e9es soient d\u00e9j\u00e0 dans la nature, mais vous n&#8217;\u00eates pas oblig\u00e9 de les y laisser.<\/span><\/p>\n<p><span data-contrast=\"auto\">McAfee vous aide \u00e0 en reprendre le contr\u00f4le. Gr\u00e2ce \u00e0 une intelligence artificielle avanc\u00e9e,<\/span> le <a href=\"https:\/\/www.mcafee.com\/en-us\/scam-detector\/\"><b><span data-contrast=\"none\">d\u00e9tecteur de fraudes de McAfee<\/span><\/b><\/a><b><span data-contrast=\"auto\"> d\u00e9tecte automatiquement les escroqueries<\/span><\/b><span data-contrast=\"auto\"> par e-mail, SMS et vid\u00e9o, bloque les liens dangereux et identifie les deepfakes, de fa\u00e7on \u00e0 bloquer les attaques avant qu&#8217;elles ne fassent des d\u00e9g\u00e2ts.<\/span><\/p>\n<p><span data-contrast=\"auto\">En outre, la fonction de <\/span><a href=\"https:\/\/www.mcafee.com\/learn\/personal-data-cleanup\/\"><span data-contrast=\"none\">nettoyage de donn\u00e9es personnelles de McAfee<\/span><\/a><span data-contrast=\"auto\"> peut vous aider \u00e0 d\u00e9terminer quels courtiers en donn\u00e9es d\u00e9tiennent vos informations personnelles et demander leur suppression en votre nom.<\/span><\/p>\n<p><span data-contrast=\"auto\">Gardez une longueur d&#8217;avance sur les escrocs. V\u00e9rifiez votre exposition, nettoyez vos donn\u00e9es et prot\u00e9gez votre identit\u00e9 gr\u00e2ce \u00e0 McAfee.<\/span><\/p>\n<p><span data-contrast=\"auto\">D\u00e9couvrez-en plus sur <\/span><a href=\"https:\/\/www.mcafee.com\/en-us\/scam-detector\/\"><span data-contrast=\"none\">McAfee et le d\u00e9tecteur de fraudes de McAfee<\/span><\/a><span data-contrast=\"auto\">. <\/span><span data-ccp-props=\"{}\">\u00a0<\/span> <span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">En savoir plus\u00a0:<\/span><\/h2>\n<p><a href=\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/privacy-identity-protection\/victime-dune-violation-de-donnees\/\"><span data-contrast=\"none\">Victime d&#8217;une violation de donn\u00e9es\u00a0?<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/privacy-identity-protection\/comment-disparaitre-d-internet\/\"><span data-contrast=\"none\">Comment dispara\u00eetre d&#8217;Internet<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/privacy-identity-protection\/votre-guide-pour-reperer-les-emails-de-phishing-et-les-escroqueries\/\"><span data-contrast=\"none\">Comment rep\u00e9rer les e-mails de phishing et les escroqueries<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Des cybercriminels ont amen\u00e9 des employ\u00e9s de grandes entreprises internationales \u00e0 leur donner acc\u00e8s \u00e0 Salesforce et ont utilis\u00e9 cet&#8230;<\/p>\n","protected":false},"author":1440,"featured_media":182192,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[11971,11941],"tags":[],"coauthors":[16711],"class_list":["post-223182","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-news","category-internet-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Des pirates am\u00e8nent des employ\u00e9s de grandes entreprises \u00e0 exposer des donn\u00e9es Salesforce | Blog McAfee<\/title>\n<meta name=\"description\" content=\"Des cybercriminels ont amen\u00e9 des employ\u00e9s de grandes entreprises \u00e0 leur donner acc\u00e8s \u00e0 Salesforce afin de voler des donn\u00e9es clients.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Des pirates am\u00e8nent des employ\u00e9s de grandes entreprises \u00e0 exposer des donn\u00e9es Salesforce | Blog McAfee\" \/>\n<meta property=\"og:description\" content=\"Des cybercriminels ont amen\u00e9 des employ\u00e9s de grandes entreprises \u00e0 leur donner acc\u00e8s \u00e0 Salesforce afin de voler des donn\u00e9es clients.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/des-pirates-amenent-de-grandes-entreprises-a-exposer-des-donnees-salesforce-decouvrez-si-vous-etes-concerne\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog McAfee\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-22T11:10:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-22T11:35:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/300x200_Blog_France-Data-Breach.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Brooke Seipel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brooke Seipel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/des-pirates-amenent-de-grandes-entreprises-a-exposer-des-donnees-salesforce-decouvrez-si-vous-etes-concerne\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/des-pirates-amenent-de-grandes-entreprises-a-exposer-des-donnees-salesforce-decouvrez-si-vous-etes-concerne\/\"},\"author\":{\"name\":\"Brooke Seipel\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/person\/e0177129df164a74082f47397af3e729\"},\"headline\":\"Des pirates am\u00e8nent des employ\u00e9s de grandes entreprises \u00e0 exposer des donn\u00e9es Salesforce\",\"datePublished\":\"2025-10-22T11:10:48+00:00\",\"dateModified\":\"2025-10-22T11:35:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/des-pirates-amenent-de-grandes-entreprises-a-exposer-des-donnees-salesforce-decouvrez-si-vous-etes-concerne\/\"},\"wordCount\":1372,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/des-pirates-amenent-de-grandes-entreprises-a-exposer-des-donnees-salesforce-decouvrez-si-vous-etes-concerne\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/300x200_Blog_France-Data-Breach.png\",\"articleSection\":[\"Actualit\u00e9s sur la s\u00e9curit\u00e9\",\"S\u00e9curit\u00e9 Internet\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/des-pirates-amenent-de-grandes-entreprises-a-exposer-des-donnees-salesforce-decouvrez-si-vous-etes-concerne\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/des-pirates-amenent-de-grandes-entreprises-a-exposer-des-donnees-salesforce-decouvrez-si-vous-etes-concerne\/\",\"name\":\"Des pirates am\u00e8nent des employ\u00e9s de grandes entreprises \u00e0 exposer des donn\u00e9es Salesforce | Blog McAfee\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/des-pirates-amenent-de-grandes-entreprises-a-exposer-des-donnees-salesforce-decouvrez-si-vous-etes-concerne\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/des-pirates-amenent-de-grandes-entreprises-a-exposer-des-donnees-salesforce-decouvrez-si-vous-etes-concerne\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/300x200_Blog_France-Data-Breach.png\",\"datePublished\":\"2025-10-22T11:10:48+00:00\",\"dateModified\":\"2025-10-22T11:35:20+00:00\",\"description\":\"Des cybercriminels ont amen\u00e9 des employ\u00e9s de grandes entreprises \u00e0 leur donner acc\u00e8s \u00e0 Salesforce afin de voler des donn\u00e9es clients.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/des-pirates-amenent-de-grandes-entreprises-a-exposer-des-donnees-salesforce-decouvrez-si-vous-etes-concerne\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/des-pirates-amenent-de-grandes-entreprises-a-exposer-des-donnees-salesforce-decouvrez-si-vous-etes-concerne\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/des-pirates-amenent-de-grandes-entreprises-a-exposer-des-donnees-salesforce-decouvrez-si-vous-etes-concerne\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/300x200_Blog_France-Data-Breach.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/300x200_Blog_France-Data-Breach.png\",\"width\":300,\"height\":200,\"caption\":\"dati di salesforce rubati\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/des-pirates-amenent-de-grandes-entreprises-a-exposer-des-donnees-salesforce-decouvrez-si-vous-etes-concerne\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Actualit\u00e9s sur la s\u00e9curit\u00e9\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Des pirates am\u00e8nent des employ\u00e9s de grandes entreprises \u00e0 exposer des donn\u00e9es Salesforce\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/\",\"name\":\"Blog McAfee\",\"description\":\"Actualit\u00e9s concernant la s\u00e9curit\u00e9 Internet\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/person\/e0177129df164a74082f47397af3e729\",\"name\":\"Brooke Seipel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/person\/image\/ac03c1083bbdcd2cbb0675dc29c62cbe\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg\",\"caption\":\"Brooke Seipel\"},\"description\":\"Brooke Seipel is the Content Editor in Chief at McAfee, where she leads the company's content strategy with a focus on cybersecurity education. With a decade of experience in audience development and digital content, Brooke has a strong understanding of online audiences, emerging trends, and the evolving cyber landscape. Before joining McAfee, Brooke led audience teams and served as both a reporter and editor at numerous award-winning publications including Fortune, The Hill, International Business Times, New Republic, and The OC Register. Brooke is dedicated to providing insightful, actionable content that empowers readers to make informed decisions about their digital safety. When she's not immersed in the world of cybersecurity, you can find her scrolling social media endlessly, soaking up the latest trends, and also volunteering as a naturalist.\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/author\/brooke-seipel\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Des pirates am\u00e8nent des employ\u00e9s de grandes entreprises \u00e0 exposer des donn\u00e9es Salesforce | Blog McAfee","description":"Des cybercriminels ont amen\u00e9 des employ\u00e9s de grandes entreprises \u00e0 leur donner acc\u00e8s \u00e0 Salesforce afin de voler des donn\u00e9es clients.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"fr_FR","og_type":"article","og_title":"Des pirates am\u00e8nent des employ\u00e9s de grandes entreprises \u00e0 exposer des donn\u00e9es Salesforce | Blog McAfee","og_description":"Des cybercriminels ont amen\u00e9 des employ\u00e9s de grandes entreprises \u00e0 leur donner acc\u00e8s \u00e0 Salesforce afin de voler des donn\u00e9es clients.","og_url":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/des-pirates-amenent-de-grandes-entreprises-a-exposer-des-donnees-salesforce-decouvrez-si-vous-etes-concerne\/","og_site_name":"Blog McAfee","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2025-10-22T11:10:48+00:00","article_modified_time":"2025-10-22T11:35:20+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/300x200_Blog_France-Data-Breach.png","type":"image\/png"}],"author":"Brooke Seipel","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Brooke Seipel","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/des-pirates-amenent-de-grandes-entreprises-a-exposer-des-donnees-salesforce-decouvrez-si-vous-etes-concerne\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/des-pirates-amenent-de-grandes-entreprises-a-exposer-des-donnees-salesforce-decouvrez-si-vous-etes-concerne\/"},"author":{"name":"Brooke Seipel","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/person\/e0177129df164a74082f47397af3e729"},"headline":"Des pirates am\u00e8nent des employ\u00e9s de grandes entreprises \u00e0 exposer des donn\u00e9es Salesforce","datePublished":"2025-10-22T11:10:48+00:00","dateModified":"2025-10-22T11:35:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/des-pirates-amenent-de-grandes-entreprises-a-exposer-des-donnees-salesforce-decouvrez-si-vous-etes-concerne\/"},"wordCount":1372,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/des-pirates-amenent-de-grandes-entreprises-a-exposer-des-donnees-salesforce-decouvrez-si-vous-etes-concerne\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/300x200_Blog_France-Data-Breach.png","articleSection":["Actualit\u00e9s sur la s\u00e9curit\u00e9","S\u00e9curit\u00e9 Internet"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/des-pirates-amenent-de-grandes-entreprises-a-exposer-des-donnees-salesforce-decouvrez-si-vous-etes-concerne\/","url":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/des-pirates-amenent-de-grandes-entreprises-a-exposer-des-donnees-salesforce-decouvrez-si-vous-etes-concerne\/","name":"Des pirates am\u00e8nent des employ\u00e9s de grandes entreprises \u00e0 exposer des donn\u00e9es Salesforce | Blog McAfee","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/des-pirates-amenent-de-grandes-entreprises-a-exposer-des-donnees-salesforce-decouvrez-si-vous-etes-concerne\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/des-pirates-amenent-de-grandes-entreprises-a-exposer-des-donnees-salesforce-decouvrez-si-vous-etes-concerne\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/300x200_Blog_France-Data-Breach.png","datePublished":"2025-10-22T11:10:48+00:00","dateModified":"2025-10-22T11:35:20+00:00","description":"Des cybercriminels ont amen\u00e9 des employ\u00e9s de grandes entreprises \u00e0 leur donner acc\u00e8s \u00e0 Salesforce afin de voler des donn\u00e9es clients.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/des-pirates-amenent-de-grandes-entreprises-a-exposer-des-donnees-salesforce-decouvrez-si-vous-etes-concerne\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/des-pirates-amenent-de-grandes-entreprises-a-exposer-des-donnees-salesforce-decouvrez-si-vous-etes-concerne\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/des-pirates-amenent-de-grandes-entreprises-a-exposer-des-donnees-salesforce-decouvrez-si-vous-etes-concerne\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/300x200_Blog_France-Data-Breach.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/300x200_Blog_France-Data-Breach.png","width":300,"height":200,"caption":"dati di salesforce rubati"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/des-pirates-amenent-de-grandes-entreprises-a-exposer-des-donnees-salesforce-decouvrez-si-vous-etes-concerne\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/"},{"@type":"ListItem","position":2,"name":"Actualit\u00e9s sur la s\u00e9curit\u00e9","item":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/"},{"@type":"ListItem","position":3,"name":"Des pirates am\u00e8nent des employ\u00e9s de grandes entreprises \u00e0 exposer des donn\u00e9es Salesforce"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#website","url":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/","name":"Blog McAfee","description":"Actualit\u00e9s concernant la s\u00e9curit\u00e9 Internet","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/person\/e0177129df164a74082f47397af3e729","name":"Brooke Seipel","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/person\/image\/ac03c1083bbdcd2cbb0675dc29c62cbe","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg","caption":"Brooke Seipel"},"description":"Brooke Seipel is the Content Editor in Chief at McAfee, where she leads the company's content strategy with a focus on cybersecurity education. With a decade of experience in audience development and digital content, Brooke has a strong understanding of online audiences, emerging trends, and the evolving cyber landscape. Before joining McAfee, Brooke led audience teams and served as both a reporter and editor at numerous award-winning publications including Fortune, The Hill, International Business Times, New Republic, and The OC Register. Brooke is dedicated to providing insightful, actionable content that empowers readers to make informed decisions about their digital safety. When she's not immersed in the world of cybersecurity, you can find her scrolling social media endlessly, soaking up the latest trends, and also volunteering as a naturalist.","url":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/author\/brooke-seipel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/posts\/223182","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/users\/1440"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/comments?post=223182"}],"version-history":[{"count":6,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/posts\/223182\/revisions"}],"predecessor-version":[{"id":223222,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/posts\/223182\/revisions\/223222"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/media\/182192"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/media?parent=223182"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/categories?post=223182"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/tags?post=223182"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/coauthors?post=223182"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}