{"id":98078,"date":"2019-12-13T16:50:49","date_gmt":"2019-12-14T00:50:49","guid":{"rendered":"\/blogs\/?p=98078"},"modified":"2025-05-14T00:28:30","modified_gmt":"2025-05-14T07:28:30","slug":"9-types-de-pirates-informatiques-et-leurs-motivations","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/9-types-de-pirates-informatiques-et-leurs-motivations\/","title":{"rendered":"9\u202ftypes de pirates informatiques et leurs motivations"},"content":{"rendered":"<p><span data-contrast=\"auto\">Des\u00a0<\/span><a href=\"https:\/\/www.csoonline.com\/article\/3212260\/the-5-biggest-ransomware-attacks-of-the-last-5-years.html\"><span data-contrast=\"none\">attaques de ransomwares<\/span><\/a><span data-contrast=\"auto\"> paralysant des entreprises et des villes enti\u00e8res aux fuites de donn\u00e9es massives exposant les informations de millions de clients, les cyberattaques ont souvent fait la une des journaux ces derni\u00e8res ann\u00e9es. Toutefois, nous entendons tr\u00e8s peu parler des pirates eux-m\u00eames.\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Bien s\u00fbr, la plupart d&#8217;entre eux dissimulent leur identit\u00e9 car ils s&#8217;adonnent \u00e0 des activit\u00e9s ill\u00e9gales, mais vous serez peut-\u00eatre surpris d&#8217;apprendre que tous les pirates ne sont pas malintentionn\u00e9s. Dans notre monde de plus en plus technologique, il existe toutes sortes de pirates informatiques.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2><span data-contrast=\"auto\">Voici\u00a0un aper\u00e7u de\u00a0leurs\u00a0activit\u00e9s\u00a0et des raisons qui les\u00a0poussent\u00a0\u00e0\u00a0agir\u202f:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true}\">\u00a0<\/span><\/h2>\n<p><b><span data-contrast=\"auto\">Pirates \u00ab\u202fwhite hat\u202f\u00bb<\/span><\/b><span data-contrast=\"auto\">\u202f: ce sont les \u00ab\u202fgentils\u202f\u00bb, des experts en s\u00e9curit\u00e9 informatique qui se sp\u00e9cialisent dans les tests d&#8217;intrusion et d&#8217;autres m\u00e9thodes pour s&#8217;assurer que les syst\u00e8mes d&#8217;information d&#8217;une entreprise sont s\u00e9curis\u00e9s. Ces professionnels de la s\u00e9curit\u00e9 informatique comptent sur un arsenal technologique en constante \u00e9volution pour combattre les \u00ab\u202fmauvais\u202f\u00bb pirates informatiques.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Pirates \u00ab\u202fblack hat\u202f\u00bb\u202f:<\/span><\/b><span data-contrast=\"auto\"> ce sont les \u00ab\u202fm\u00e9chants\u202f\u00bb pirates informatiques, ceux qu&#8217;on se contente g\u00e9n\u00e9ralement de qualifier de pirates. Le terme est souvent utilis\u00e9 sp\u00e9cifiquement pour les pirates informatiques qui p\u00e9n\u00e8trent dans les r\u00e9seaux et les ordinateurs, ou qui cr\u00e9ent des virus informatiques. Les pirates \u00ab\u202fblack hat\u202f\u00bb ont toujours une longueur d&#8217;avance technologique sur les \u00ab\u202fwhite hat\u202f\u00bb. Ils r\u00e9ussissent souvent \u00e0 trouver la voie d&#8217;acc\u00e8s la moins prot\u00e9g\u00e9e, qu&#8217;elle soit due \u00e0 une erreur humaine ou \u00e0 la paresse, ou bien ils mettent en place un nouveau type d&#8217;attaque. Les puristes du piratage informatique utilisent souvent le terme \u00ab\u202fcracker\u202f\u00bb pour d\u00e9signer les pirates \u00ab\u202fblack hat\u202f\u00bb. En g\u00e9n\u00e9ral, c&#8217;est l&#8217;argent qui motive les pirates \u00ab\u202fblack hat\u202f\u00bb.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Pirates \u00ab\u202fgray hat\u202f\u00bb<\/span><\/b><span data-contrast=\"auto\"><b>\u202f:<\/b> ces pirates informatiques n&#8217;utilisent pas leurs comp\u00e9tences pour servir leur int\u00e9r\u00eat personnel, mais n&#8217;agissent pas non plus dans la plus grande honn\u00eatet\u00e9. Par exemple, un pirate informatique qui p\u00e9n\u00e8tre dans le syst\u00e8me d&#8217;une entreprise pour r\u00e9v\u00e9ler une vuln\u00e9rabilit\u00e9 et en parler sur Internet peut en fin de compte agir dans l&#8217;int\u00e9r\u00eat des clients de l&#8217;entreprise. Cependant, par son action, il compromet \u00e9galement un syst\u00e8me sans autorisation.\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Si le m\u00eame pirate exige de l&#8217;argent \u00e0 l&#8217;entreprise pour ne pas r\u00e9v\u00e9ler la vuln\u00e9rabilit\u00e9, il passe alors dans la cat\u00e9gorie des pirates \u00ab\u202fblack hat\u202f\u00bb, agissant uniquement pour son enrichissement personnel.<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Script\u00a0kiddies\u202f:<\/span><\/b><span data-contrast=\"auto\"> ce terme p\u00e9joratif d\u00e9signe des pirates \u00ab\u202fblack hat\u202f\u00bb qui utilisent des programmes t\u00e9l\u00e9charg\u00e9s sur Internet pour attaquer des r\u00e9seaux et d\u00e9grader des sites web dans le but de se faire un nom.<\/span><\/p>\n<p><span data-contrast=\"auto\">Certains script kiddies font partie de la cat\u00e9gorie relativement r\u00e9cente des pirates \u00ab\u202fgreen hat\u202f\u00bb, rassemblant des pirates amateurs, curieux et avides de connaissances, qui pourraient un jour devenir de v\u00e9ritables pirates informatiques.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Hacktivistes\u202f:<\/span><\/b><span data-contrast=\"auto\">\u00a0ces\u00a0pirates\u00a0aspirent\u00a0au\u00a0changement\u00a0social.\u00a0Certains\u00a0hacktivistes\u00a0tentent\u00a0d&#8217;exposer\u00a0des\u00a0abus\u00a0ou\u00a0de faire\u00a0avancer\u00a0une\u00a0cause politique\u00a0ou\u00a0religieuse.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Par\u00a0exemple,\u00a0lors\u00a0du Printemps\u00a0arabe,\u00a0certains\u00a0hacktivistes\u00a0ont\u00a0permis\u00a0\u00e0 des\u00a0groupes\u00a0menac\u00e9s\u00a0de\u00a0communiquer\u00a0de mani\u00e8re\u00a0s\u00e9curis\u00e9e\u00a0ainsi\u00a0que\u00a0d&#8217;acc\u00e9der\u00a0\u00e0 des pages web\u00a0censur\u00e9es\u00a0par le\u00a0gouvernement.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Pirates soutenus par un \u00c9tat\u202f:<\/span><\/b><span data-contrast=\"auto\"> les\u00a0gouvernements\u00a0du monde\u00a0entier\u00a0se\u00a0rendent\u00a0compte\u00a0qu&#8217;il\u00a0est\u00a0militairement\u00a0avantageux\u00a0d&#8217;\u00eatre bien\u00a0positionn\u00e9\u00a0sur le Web. On\u00a0disait\u00a0\u00ab\u202fCelui\u00a0qui\u00a0commande\u00a0la\u00a0mer\u00a0commande\u00a0le monde\u202f\u00bb,\u00a0puis\u00a0\u00ab\u202fCelui\u00a0qui\u00a0commande\u00a0les airs\u00a0commande\u00a0le monde\u202f\u00bb. Il\u00a0s&#8217;agit\u00a0d\u00e9sormais\u00a0de commander le\u00a0cyberespace. Les pirates\u00a0informatiques\u00a0financ\u00e9s\u00a0par des \u00c9tats\u00a0ont\u00a0acc\u00e8s\u00a0\u00e0 des\u00a0ressources\u00a0illimit\u00e9es\u00a0pour\u00a0cibler\u00a0des civils, des\u00a0entreprises\u00a0et des\u00a0gouvernements.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Cyber-espions\u202f:<\/span><\/b><span data-contrast=\"auto\"> certaines entreprises engagent des pirates informatiques pour infiltrer la concurrence et d\u00e9rober des secrets commerciaux. Ils peuvent s&#8217;infiltrer dans les syst\u00e8mes de l&#8217;entreprise qu&#8217;ils espionnent depuis l&#8217;ext\u00e9rieur ou bien s&#8217;y faire embaucher et jouer le r\u00f4le de taupe. Les cyber-espions peuvent utiliser les m\u00eames m\u00e9thodes que les hacktivistes, mais leur seul but est de servir les int\u00e9r\u00eats de leur client pour \u00eatre pay\u00e9s.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Lanceurs\u00a0d&#8217;alerte<\/span><\/b><span data-contrast=\"auto\">\u202f: il s&#8217;agit de personnes qui utilisent leur acc\u00e8s aux syst\u00e8mes d&#8217;une organisation dont ils font partie pour faire fuiter des informations qu&#8217;ils jugent important de rendre publiques. <\/span><\/p>\n<p><span data-contrast=\"auto\">Toutefois, ces employ\u00e9s peuvent \u00e9galement \u00eatre malintentionn\u00e9s, ou entretenir une rancune contre l&#8217;entreprise. Ces pirates peuvent acc\u00e9der aux informations pur vendre des secrets commerciaux ou se faire embaucher par une autre entreprise. Dans ce cas, on parle d&#8217;\u00ab\u202finiti\u00e9s malveillants\u202f\u00bb.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Cyberterroristes\u202f:<\/span><\/b><span data-contrast=\"auto\"> ces pirates informatiques, g\u00e9n\u00e9ralement motiv\u00e9s par des croyances religieuses ou politiques, tentent de cr\u00e9er la peur et le chaos en perturbant des infrastructures critiques. Les cyberterroristes sont de loin les pirates les plus dangereux et poss\u00e8dent un vaste \u00e9ventail de comp\u00e9tences et d&#8217;objectifs. L&#8217;objectif final des cyberterroristes est de faire r\u00e9gner la peur, la terreur et la violence.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Assurez-vous\u00a0de\u00a0prot\u00e9ger\u00a0vos\u00a0informations\u00a0sensibles\u00a0contre\u00a0tous\u00a0les types de\u00a0piratage\u00a0\u00e0\u00a0l&#8217;aide\u00a0d&#8217;un\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/consumer\/en-us\/store\/m0\/catalog.html\"><span data-contrast=\"none\">logiciel de s\u00e9curit\u00e9<\/span><\/a><span data-contrast=\"auto\"> complet, qui comprend une protection contre le vol d&#8217;identit\u00e9.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"auto\">Robert Siciliano\u00a0est\u00a0consultant\u00a0aupr\u00e8s\u00a0de McAfee et\u00a0sp\u00e9cialiste\u00a0du vol\u00a0d&#8217;identit\u00e9.\u00a0<\/span><\/i><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true}\">\u00a0<\/span><\/p>\n<p aria-level=\"1\"><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Des\u00a0attaques de ransomwares paralysant des entreprises et des villes enti\u00e8res aux fuites de donn\u00e9es massives exposant les informations de millions&#8230;<\/p>\n","protected":false},"author":674,"featured_media":97221,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[11941],"tags":[],"coauthors":[16309],"class_list":["post-98078","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>9\u202ftypes de pirates informatiques et leurs motivations | Blog McAfee<\/title>\n<meta name=\"description\" content=\"Des\u00a0attaques de ransomwares paralysant des entreprises et des villes enti\u00e8res aux fuites de donn\u00e9es massives exposant les informations de millions de\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"9\u202ftypes de pirates informatiques et leurs motivations | Blog McAfee\" \/>\n<meta property=\"og:description\" content=\"Des\u00a0attaques de ransomwares paralysant des entreprises et des villes enti\u00e8res aux fuites de donn\u00e9es massives exposant les informations de millions de\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/9-types-de-pirates-informatiques-et-leurs-motivations\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog McAfee\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-14T00:50:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-14T07:28:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/shutterstock_669170779.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"563\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/9-types-de-pirates-informatiques-et-leurs-motivations\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/9-types-de-pirates-informatiques-et-leurs-motivations\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"9\u202ftypes de pirates informatiques et leurs motivations\",\"datePublished\":\"2019-12-14T00:50:49+00:00\",\"dateModified\":\"2025-05-14T07:28:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/9-types-de-pirates-informatiques-et-leurs-motivations\/\"},\"wordCount\":929,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/9-types-de-pirates-informatiques-et-leurs-motivations\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/shutterstock_669170779.jpg\",\"articleSection\":[\"S\u00e9curit\u00e9 Internet\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/9-types-de-pirates-informatiques-et-leurs-motivations\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/9-types-de-pirates-informatiques-et-leurs-motivations\/\",\"name\":\"9\u202ftypes de pirates informatiques et leurs motivations | Blog McAfee\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/9-types-de-pirates-informatiques-et-leurs-motivations\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/9-types-de-pirates-informatiques-et-leurs-motivations\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/shutterstock_669170779.jpg\",\"datePublished\":\"2019-12-14T00:50:49+00:00\",\"dateModified\":\"2025-05-14T07:28:30+00:00\",\"description\":\"Des\u00a0attaques de ransomwares paralysant des entreprises et des villes enti\u00e8res aux fuites de donn\u00e9es massives exposant les informations de millions de\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/9-types-de-pirates-informatiques-et-leurs-motivations\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/9-types-de-pirates-informatiques-et-leurs-motivations\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/9-types-de-pirates-informatiques-et-leurs-motivations\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/shutterstock_669170779.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/shutterstock_669170779.jpg\",\"width\":1000,\"height\":563},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/9-types-de-pirates-informatiques-et-leurs-motivations\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e9curit\u00e9 Internet\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"9\u202ftypes de pirates informatiques et leurs motivations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/\",\"name\":\"Blog McAfee\",\"description\":\"Actualit\u00e9s concernant la s\u00e9curit\u00e9 Internet\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"9\u202ftypes de pirates informatiques et leurs motivations | Blog McAfee","description":"Des\u00a0attaques de ransomwares paralysant des entreprises et des villes enti\u00e8res aux fuites de donn\u00e9es massives exposant les informations de millions de","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"fr_FR","og_type":"article","og_title":"9\u202ftypes de pirates informatiques et leurs motivations | Blog McAfee","og_description":"Des\u00a0attaques de ransomwares paralysant des entreprises et des villes enti\u00e8res aux fuites de donn\u00e9es massives exposant les informations de millions de","og_url":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/9-types-de-pirates-informatiques-et-leurs-motivations\/","og_site_name":"Blog McAfee","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2019-12-14T00:50:49+00:00","article_modified_time":"2025-05-14T07:28:30+00:00","og_image":[{"width":1000,"height":563,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/shutterstock_669170779.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/9-types-de-pirates-informatiques-et-leurs-motivations\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/9-types-de-pirates-informatiques-et-leurs-motivations\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"9\u202ftypes de pirates informatiques et leurs motivations","datePublished":"2019-12-14T00:50:49+00:00","dateModified":"2025-05-14T07:28:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/9-types-de-pirates-informatiques-et-leurs-motivations\/"},"wordCount":929,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/9-types-de-pirates-informatiques-et-leurs-motivations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/shutterstock_669170779.jpg","articleSection":["S\u00e9curit\u00e9 Internet"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/9-types-de-pirates-informatiques-et-leurs-motivations\/","url":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/9-types-de-pirates-informatiques-et-leurs-motivations\/","name":"9\u202ftypes de pirates informatiques et leurs motivations | Blog McAfee","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/9-types-de-pirates-informatiques-et-leurs-motivations\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/9-types-de-pirates-informatiques-et-leurs-motivations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/shutterstock_669170779.jpg","datePublished":"2019-12-14T00:50:49+00:00","dateModified":"2025-05-14T07:28:30+00:00","description":"Des\u00a0attaques de ransomwares paralysant des entreprises et des villes enti\u00e8res aux fuites de donn\u00e9es massives exposant les informations de millions de","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/9-types-de-pirates-informatiques-et-leurs-motivations\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/9-types-de-pirates-informatiques-et-leurs-motivations\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/9-types-de-pirates-informatiques-et-leurs-motivations\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/shutterstock_669170779.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/10\/shutterstock_669170779.jpg","width":1000,"height":563},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/9-types-de-pirates-informatiques-et-leurs-motivations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9 Internet","item":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/"},{"@type":"ListItem","position":3,"name":"9\u202ftypes de pirates informatiques et leurs motivations"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#website","url":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/","name":"Blog McAfee","description":"Actualit\u00e9s concernant la s\u00e9curit\u00e9 Internet","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/posts\/98078","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/comments?post=98078"}],"version-history":[{"count":5,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/posts\/98078\/revisions"}],"predecessor-version":[{"id":213373,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/posts\/98078\/revisions\/213373"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/media\/97221"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/media?parent=98078"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/categories?post=98078"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/tags?post=98078"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/coauthors?post=98078"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}