{"id":7704,"date":"2025-07-17T09:00:00","date_gmt":"2025-07-17T09:00:00","guid":{"rendered":"https:\/\/trustpair.com\/business-email-compromise-lattaque-preferee-des-fraudeurs\/"},"modified":"2026-01-16T11:31:52","modified_gmt":"2026-01-16T11:31:52","slug":"business-email-compromise-lattaque-preferee-des-fraudeurs","status":"publish","type":"post","link":"https:\/\/trustpair.com\/fr\/blog\/business-email-compromise-lattaque-preferee-des-fraudeurs\/","title":{"rendered":"Business Email Compromise : l\u2019attaque pr\u00e9f\u00e9r\u00e9e des fraudeurs"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Le Business Email Compromise co\u00fbte de plus en plus cher aux entreprises : d\u2019apr\u00e8s <\/span><a href=\"https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2020_IC3Report.pdf\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">l\u2019IC3 Report du FBI<\/span><\/a><span style=\"font-weight: 400;\">, ce sont 1,7 milliards de dollars qui ont \u00e9t\u00e9 d\u00e9rob\u00e9s de cette mani\u00e8re en 2019. En 2020 ce chiffre est mont\u00e9 \u00e0 1,8 milliards de dollars, soit 61% d\u2019augmentation depuis 2016. Ces chiffres ne tiennent compte que des cas port\u00e9s \u00e0 la connaissance des autorit\u00e9s : le montant r\u00e9el des pertes \u00e0 d\u00e9plorer est indubitablement plus \u00e9lev\u00e9.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">La crise sanitaire du COVID-19 a provoqu\u00e9 une utilisation massive de cette technique de fraude et les entreprises sont de plus en plus expos\u00e9es. Qu\u2019est-ce que le business email compromise (BEC) exactement et comment s\u2019en prot\u00e9ger ?<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Qu&rsquo;est ce que le Business Email Compromise ?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Le BEC ou la compromission d\u2019email en fran\u00e7ais, est le recours \u00e0 des emails frauduleux pour mener une attaque informatique sur une entreprise. Ces mails ont pour but de pousser les destinataires \u00e0 faire des virements bancaires ou \u00e0 transmettre des donn\u00e9es sensibles aux fraudeurs. Ils peuvent contenir une URL ou une pi\u00e8ce jointe utilis\u00e9e pour subtiliser ces donn\u00e9es ou bien introduire un virus ou des logiciels malveillants.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ces mails frauduleux sont souvent envoy\u00e9s \u00e0 partir d&rsquo;une adresse proche de celle du PDG ou d&rsquo;une personne \u00e9lev\u00e9e dans la hi\u00e9rarchie de l\u2019entreprise. Ils rev\u00eatent \u00e9galement un caract\u00e8re d&rsquo;urgence et de confidentialit\u00e9.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Business Email Compromise : quel est son mode de fonctionnement ?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Le but de ce type d&#8217;email est de faire croire \u00e0 son destinataire qu&rsquo;il provient de son chef d&rsquo;entreprise ou d&rsquo;un directeur financier. Le fraudeur op\u00e8re de la mani\u00e8re suivante :<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Il m\u00e8ne des recherches pouss\u00e9es sur l&rsquo;entreprise : identifier la victime, ses sup\u00e9rieurs ainsi que le moment le plus propice \u00e0 l&rsquo;arnaque.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Il r\u00e9dige ensuite le mail en usurpant l\u2019identit\u00e9 d\u2019un membre \u00e9lev\u00e9 dans la hi\u00e9rarchie de l\u2019entreprise. Il demande \u00e0 sa victime de transf\u00e9rer une somme d\u2019argent sur un compte bancaire dont il fournit les coordonn\u00e9es, ou bien de transmettre des informations \u00e0 caract\u00e8re personnel sur les employ\u00e9s.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">En 2019, selon l\u2019IC3 Report du FBI, 21% des victimes de BEC n\u2019ont jamais r\u00e9cup\u00e9r\u00e9 les fonds extorqu\u00e9s.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Les diff\u00e9rents type d&rsquo;arnaque BEC<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Les BEC comprennent tous les types de cyberfraude par email et font souvent appel \u00e0 l\u2019usurpation d\u2019identit\u00e9 :<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Le <\/span><span style=\"font-weight: 400;\">phishing <\/span><span style=\"font-weight: 400;\">et le <\/span><a href=\"https:\/\/trustpair.fr\/blog\/spearphishing-explications-et-comment-lutter-contre\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">spearphishing<\/span><\/a><span style=\"font-weight: 400;\"> : une tentative d\u2019escroquerie pour extorquer de l\u2019argent, parfois en se faisant passer pour quelqu\u2019un de connu de la victime.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">La <a href=\"https:\/\/trustpair.fr\/fraude-au-president\/\">fraude au pr\u00e9sident<\/a> : l\u2019usurpation d\u2019identit\u00e9 d\u2019un sup\u00e9rieur hi\u00e9rarchique pour pi\u00e9ger la victime.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Le <\/span><a href=\"https:\/\/trustpair.fr\/blog\/spoofing-attention-aux-usurpations-adresses-mail\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">spoofing<\/span><\/a><span style=\"font-weight: 400;\"> ou l&rsquo;utilisation d\u2019une adresse email ressemblant \u00e0 s\u2019y m\u00e9prendre \u00e0 une adresse email connue de la victime.<\/span><\/li>\n<\/ul>\n<p><!--HubSpot Call-to-Action Code --><span id=\"hs-cta-wrapper-b84390c1-f9e3-416b-b288-ae8b63088b5f\" class=\"hs-cta-wrapper\"><span id=\"hs-cta-b84390c1-f9e3-416b-b288-ae8b63088b5f\" class=\"hs-cta-node hs-cta-b84390c1-f9e3-416b-b288-ae8b63088b5f\"><!-- [if lte IE 8]>\n\n\n<div id=\"hs-cta-ie-element\"><\/div>\n\n\n<![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5278241\/b84390c1-f9e3-416b-b288-ae8b63088b5f\" target=\"_blank\" rel=\"noopener\"><img fetchpriority=\"high\" decoding=\"async\" id=\"hs-cta-img-b84390c1-f9e3-416b-b288-ae8b63088b5f\" class=\"hs-cta-img\" style=\"border-width: 0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5278241\/b84390c1-f9e3-416b-b288-ae8b63088b5f.png\" alt=\"Fraude au virement : comment se prot\u00e9ger ? - Livre Blanc Trustpair\" width=\"1200\" height=\"630\" \/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(5278241, 'b84390c1-f9e3-416b-b288-ae8b63088b5f', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code --><\/p>\n<h2><span style=\"font-weight: 400;\">Quel est l&rsquo;impact concret du BEC en entreprise ?<\/span><\/h2>\n<h3><span style=\"font-weight: 400;\">MATTEL : 3 millions de dollars\u00a0 (2015)<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Dans <\/span><a href=\"https:\/\/news.softpedia.com\/news\/toy-maker-mattel-loses-3m-in-bec-scam-then-fights-for-it-and-gets-it-back-502401.shtml\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">cette situation<\/span><\/a><span style=\"font-weight: 400;\">, le hacker a profit\u00e9 du changement de personnel pour lancer son attaque : se faisant passer pour le nouveau PDG, il a demand\u00e9 \u00e0 une cadre du service financier d\u2019effectuer un virement pour le compte d\u2019un fournisseur bas\u00e9 en Chine.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Heureusement pour Mattel, le jour choisi par le fraudeur pour mener son attaque \u00e9tait f\u00e9ri\u00e9 en Chine. L\u2019entreprise a signal\u00e9 l\u2019arnaque \u00e0 temps pour sauver ses 3 millions <\/span><span style=\"font-weight: 400;\">de dollars<\/span><span style=\"font-weight: 400;\"> compromis.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">NIKKEI : 29 millions de dollars (2019)<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Cet exemple implique une <\/span><a href=\"https:\/\/trustpair.fr\/blog\/fraude-au-faux-fournisseur-menace-entreprise\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">fraude au faux fournisseur<\/span><\/a><span style=\"font-weight: 400;\"> cette fois-ci : le pirate a compromis l\u2019adresse email d\u2019un fournisseur de <\/span><a href=\"https:\/\/www.nikkei.co.jp\/nikkeiinfo\/en\/news\/press\/597.html\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Nikkei<\/span><\/a><span style=\"font-weight: 400;\"> et obtenu d\u2019un employ\u00e9 am\u00e9ricain de l\u2019entreprise un virement de 29 millions de dollars.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Le collaborateur n\u2019avait aucune raison de se m\u00e9fier : l\u2019adresse email utilis\u00e9e \u00e9tait pourtant\u00a0 bien connue.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">BEC : comment s&rsquo;en prot\u00e9ger ?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Pour prot\u00e9ger sa Direction financi\u00e8re\u00a0 d\u2019un Business Email Compromise ainsi que ses clients, certaines actions sont incontournables pour toutes les entreprises :<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Les mots de passe et les codes doivent \u00eatre toujours tenus secrets. Ils doivent \u00eatre chang\u00e9s r\u00e9guli\u00e8rement et tr\u00e8s difficiles \u00e0 trouver.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Toujours v\u00e9rifier avec attention l\u2019exp\u00e9diteur de l\u2019email : ne pas cliquer sur les liens ou ouvrir les pi\u00e8ces jointes avant d\u2019avoir la certitude de l\u2019identit\u00e9 de l\u2019exp\u00e9diteur.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Mettre en place un syst\u00e8me de double authentification pour confirmer toutes les requ\u00eates, surtout quand elles comprennent un virement ou la communication de donn\u00e9es sensibles.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Pour limiter les risques au maximum, il faut sensibiliser autant que possible ses salari\u00e9s : les former \u00e0 la cybers\u00e9curit\u00e9 est un \u00e9l\u00e9ment essentiel de protection de l\u2019entreprise.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Trustpair, la solution pour automatiser les contr\u00f4les<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Le Business Email Compromise mise sa r\u00e9ussite sur l\u2019erreur humaine et la flexibilit\u00e9 des processus de contr\u00f4le. Malgr\u00e9 toute la sensibilisation et les v\u00e9rifications possibles, cette marge d\u2019erreur est inh\u00e9rente \u00e0 toute entreprise.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Pour y rem\u00e9dier, Trustpair permet de v\u00e9rifier automatiquement le couple Coordonn\u00e9es bancaires &lt;&gt; Identifiant d\u2019entreprise de vos tiers et audit en continu les donn\u00e9es du r\u00e9f\u00e9rentiel tiers pour garantir des informations fiables et s\u00e9curis\u00e9es en temps r\u00e9el. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Cette multiplication des points de contr\u00f4les tout au long du processus Procure to Pay\u00a0 prot\u00e8ge l\u2019entreprise contre les tentatives de fraudes et permet aux Directions financi\u00e8res d\u2019assurer la s\u00e9curit\u00e9 forte de leurs paiements.<\/span><\/p>\n<p><!--HubSpot Call-to-Action Code --><span id=\"hs-cta-wrapper-c9e9ae3c-db20-450d-a00d-62d229269d5f\" class=\"hs-cta-wrapper\"><span id=\"hs-cta-c9e9ae3c-db20-450d-a00d-62d229269d5f\" class=\"hs-cta-node hs-cta-c9e9ae3c-db20-450d-a00d-62d229269d5f\"><!-- [if lte IE 8]>\n\n\n<div id=\"hs-cta-ie-element\"><\/div>\n\n\n<![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5278241\/c9e9ae3c-db20-450d-a00d-62d229269d5f\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" id=\"hs-cta-img-c9e9ae3c-db20-450d-a00d-62d229269d5f\" class=\"hs-cta-img\" style=\"border-width: 0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5278241\/c9e9ae3c-db20-450d-a00d-62d229269d5f.png\" alt=\"Nouveau call-to-action\" width=\"900\" height=\"305\" \/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(5278241, 'c9e9ae3c-db20-450d-a00d-62d229269d5f', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code --><\/p>\n<hr \/>\n<h3>POINT \u00c0 RETENIR<\/h3>\n<ul>\n<li>Le Business Email Compromise est une attaque informatique se servant d&#8217;emails frauduleux afin de pousser les destinataires de ces mails \u00e0 faire des virements bancaires ou \u00e0 transmettre des donn\u00e9es sensibles.<\/li>\n<li>La crise sanitaire du COVID-19 a augment\u00e9 l&rsquo;utilisation de cette technique de fraude.<\/li>\n<li>Le phishing, le spoofing ou encore l&rsquo;arnaque au pr\u00e9sident sont des attaques BEC.<\/li>\n<li>Pour se prot\u00e9ger d&rsquo;un BEC, certaines actions sont primordiales : mots de passe et codes confidentiels, v\u00e9rification de l&rsquo;exp\u00e9diteur de l&#8217;email, mise en place d&rsquo;un syst\u00e8me \u00e0 double authentification.<\/li>\n<li>Automatiser les contr\u00f4les avec Trustpair, <a href=\"https:\/\/trustpair.com\/fr\/blog\/quel-est-le-meilleur-logiciel-anti-fraude\/\">le meilleur logiciel anti-fraude pour les grandes entreprises<\/a>, est un bon moyen pour contrer le Business Email Compromise.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Le Business Email Compromise co\u00fbte de plus en plus cher aux entreprises : d\u2019apr\u00e8s l\u2019IC3 Report du FBI, ce sont 1,7 milliards de dollars qui ont \u00e9t\u00e9 d\u00e9rob\u00e9s de cette mani\u00e8re en 2019. En 2020 ce chiffre est mont\u00e9 \u00e0 1,8 milliards de dollars, soit 61% d\u2019augmentation depuis 2016. Ces chiffres ne tiennent compte que [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":7705,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[85],"tags":[],"class_list":["post-7704","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-fraude-virement"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Business Email Compromise : l\u2019attaque pr\u00e9f\u00e9r\u00e9e des fraudeurs - Trustpair<\/title>\n<meta name=\"description\" content=\"Le Business Email Compromise est une attaque informatique visant \u00e0 extorquer de l\u2019argent \u00e0 des entreprise. Pour en savoir plus.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/trustpair.com\/fr\/blog\/business-email-compromise-lattaque-preferee-des-fraudeurs\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Business Email Compromise : l\u2019attaque pr\u00e9f\u00e9r\u00e9e des fraudeurs - Trustpair\" \/>\n<meta property=\"og:description\" content=\"Le Business Email Compromise est une attaque informatique visant \u00e0 extorquer de l\u2019argent \u00e0 des entreprise. Pour en savoir plus.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/trustpair.com\/fr\/blog\/business-email-compromise-lattaque-preferee-des-fraudeurs\/\" \/>\n<meta property=\"og:site_name\" content=\"Trustpair\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-17T09:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-16T11:31:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trustpair.com\/wp-content\/uploads\/BEC.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"593\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"trustpair_2438\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"trustpair_2438\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/trustpair.com\/fr\/blog\/business-email-compromise-lattaque-preferee-des-fraudeurs\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/trustpair.com\/fr\/blog\/business-email-compromise-lattaque-preferee-des-fraudeurs\/\"},\"author\":{\"name\":\"trustpair_2438\",\"@id\":\"https:\/\/trustpair.com\/fr\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034\"},\"headline\":\"Business Email Compromise : l\u2019attaque pr\u00e9f\u00e9r\u00e9e des fraudeurs\",\"datePublished\":\"2025-07-17T09:00:00+00:00\",\"dateModified\":\"2026-01-16T11:31:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/trustpair.com\/fr\/blog\/business-email-compromise-lattaque-preferee-des-fraudeurs\/\"},\"wordCount\":1036,\"publisher\":{\"@id\":\"https:\/\/trustpair.com\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/fr\/blog\/business-email-compromise-lattaque-preferee-des-fraudeurs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/BEC.png\",\"articleSection\":[\"Fraude au virement\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/trustpair.com\/fr\/blog\/business-email-compromise-lattaque-preferee-des-fraudeurs\/\",\"url\":\"https:\/\/trustpair.com\/fr\/blog\/business-email-compromise-lattaque-preferee-des-fraudeurs\/\",\"name\":\"Business Email Compromise : l\u2019attaque pr\u00e9f\u00e9r\u00e9e des fraudeurs - Trustpair\",\"isPartOf\":{\"@id\":\"https:\/\/trustpair.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/trustpair.com\/fr\/blog\/business-email-compromise-lattaque-preferee-des-fraudeurs\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/fr\/blog\/business-email-compromise-lattaque-preferee-des-fraudeurs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/BEC.png\",\"datePublished\":\"2025-07-17T09:00:00+00:00\",\"dateModified\":\"2026-01-16T11:31:52+00:00\",\"description\":\"Le Business Email Compromise est une attaque informatique visant \u00e0 extorquer de l\u2019argent \u00e0 des entreprise. Pour en savoir plus.\",\"breadcrumb\":{\"@id\":\"https:\/\/trustpair.com\/fr\/blog\/business-email-compromise-lattaque-preferee-des-fraudeurs\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/trustpair.com\/fr\/blog\/business-email-compromise-lattaque-preferee-des-fraudeurs\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/trustpair.com\/fr\/blog\/business-email-compromise-lattaque-preferee-des-fraudeurs\/#primaryimage\",\"url\":\"https:\/\/trustpair.com\/wp-content\/uploads\/BEC.png\",\"contentUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/BEC.png\",\"width\":1200,\"height\":593},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/trustpair.com\/fr\/blog\/business-email-compromise-lattaque-preferee-des-fraudeurs\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/trustpair.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Business Email Compromise : l\u2019attaque pr\u00e9f\u00e9r\u00e9e des fraudeurs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/trustpair.com\/fr\/#website\",\"url\":\"https:\/\/trustpair.com\/fr\/\",\"name\":\"Trustpair\",\"description\":\"Solution leader de pr\u00e9vention de la fraude au virement et de contr\u00f4le RIB fournisseurs\",\"publisher\":{\"@id\":\"https:\/\/trustpair.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/trustpair.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/trustpair.com\/fr\/#organization\",\"name\":\"Trustpair\",\"url\":\"https:\/\/trustpair.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/trustpair.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg\",\"contentUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg\",\"width\":304,\"height\":73,\"caption\":\"Trustpair\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/fr\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/trustpair.com\/fr\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034\",\"name\":\"trustpair_2438\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"caption\":\"trustpair_2438\"},\"sameAs\":[\"http:\/\/trustpair.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Business Email Compromise : l\u2019attaque pr\u00e9f\u00e9r\u00e9e des fraudeurs - Trustpair","description":"Le Business Email Compromise est une attaque informatique visant \u00e0 extorquer de l\u2019argent \u00e0 des entreprise. Pour en savoir plus.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/trustpair.com\/fr\/blog\/business-email-compromise-lattaque-preferee-des-fraudeurs\/","og_locale":"fr_FR","og_type":"article","og_title":"Business Email Compromise : l\u2019attaque pr\u00e9f\u00e9r\u00e9e des fraudeurs - Trustpair","og_description":"Le Business Email Compromise est une attaque informatique visant \u00e0 extorquer de l\u2019argent \u00e0 des entreprise. Pour en savoir plus.","og_url":"https:\/\/trustpair.com\/fr\/blog\/business-email-compromise-lattaque-preferee-des-fraudeurs\/","og_site_name":"Trustpair","article_published_time":"2025-07-17T09:00:00+00:00","article_modified_time":"2026-01-16T11:31:52+00:00","og_image":[{"width":1200,"height":593,"url":"https:\/\/trustpair.com\/wp-content\/uploads\/BEC.png","type":"image\/png"}],"author":"trustpair_2438","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"trustpair_2438","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/trustpair.com\/fr\/blog\/business-email-compromise-lattaque-preferee-des-fraudeurs\/#article","isPartOf":{"@id":"https:\/\/trustpair.com\/fr\/blog\/business-email-compromise-lattaque-preferee-des-fraudeurs\/"},"author":{"name":"trustpair_2438","@id":"https:\/\/trustpair.com\/fr\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034"},"headline":"Business Email Compromise : l\u2019attaque pr\u00e9f\u00e9r\u00e9e des fraudeurs","datePublished":"2025-07-17T09:00:00+00:00","dateModified":"2026-01-16T11:31:52+00:00","mainEntityOfPage":{"@id":"https:\/\/trustpair.com\/fr\/blog\/business-email-compromise-lattaque-preferee-des-fraudeurs\/"},"wordCount":1036,"publisher":{"@id":"https:\/\/trustpair.com\/fr\/#organization"},"image":{"@id":"https:\/\/trustpair.com\/fr\/blog\/business-email-compromise-lattaque-preferee-des-fraudeurs\/#primaryimage"},"thumbnailUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/BEC.png","articleSection":["Fraude au virement"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/trustpair.com\/fr\/blog\/business-email-compromise-lattaque-preferee-des-fraudeurs\/","url":"https:\/\/trustpair.com\/fr\/blog\/business-email-compromise-lattaque-preferee-des-fraudeurs\/","name":"Business Email Compromise : l\u2019attaque pr\u00e9f\u00e9r\u00e9e des fraudeurs - Trustpair","isPartOf":{"@id":"https:\/\/trustpair.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/trustpair.com\/fr\/blog\/business-email-compromise-lattaque-preferee-des-fraudeurs\/#primaryimage"},"image":{"@id":"https:\/\/trustpair.com\/fr\/blog\/business-email-compromise-lattaque-preferee-des-fraudeurs\/#primaryimage"},"thumbnailUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/BEC.png","datePublished":"2025-07-17T09:00:00+00:00","dateModified":"2026-01-16T11:31:52+00:00","description":"Le Business Email Compromise est une attaque informatique visant \u00e0 extorquer de l\u2019argent \u00e0 des entreprise. Pour en savoir plus.","breadcrumb":{"@id":"https:\/\/trustpair.com\/fr\/blog\/business-email-compromise-lattaque-preferee-des-fraudeurs\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/trustpair.com\/fr\/blog\/business-email-compromise-lattaque-preferee-des-fraudeurs\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/trustpair.com\/fr\/blog\/business-email-compromise-lattaque-preferee-des-fraudeurs\/#primaryimage","url":"https:\/\/trustpair.com\/wp-content\/uploads\/BEC.png","contentUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/BEC.png","width":1200,"height":593},{"@type":"BreadcrumbList","@id":"https:\/\/trustpair.com\/fr\/blog\/business-email-compromise-lattaque-preferee-des-fraudeurs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/trustpair.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Business Email Compromise : l\u2019attaque pr\u00e9f\u00e9r\u00e9e des fraudeurs"}]},{"@type":"WebSite","@id":"https:\/\/trustpair.com\/fr\/#website","url":"https:\/\/trustpair.com\/fr\/","name":"Trustpair","description":"Solution leader de pr\u00e9vention de la fraude au virement et de contr\u00f4le RIB fournisseurs","publisher":{"@id":"https:\/\/trustpair.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/trustpair.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/trustpair.com\/fr\/#organization","name":"Trustpair","url":"https:\/\/trustpair.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/trustpair.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg","contentUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg","width":304,"height":73,"caption":"Trustpair"},"image":{"@id":"https:\/\/trustpair.com\/fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/trustpair.com\/fr\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034","name":"trustpair_2438","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","caption":"trustpair_2438"},"sameAs":["http:\/\/trustpair.com"]}]}},"_links":{"self":[{"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/posts\/7704","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/comments?post=7704"}],"version-history":[{"count":1,"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/posts\/7704\/revisions"}],"predecessor-version":[{"id":25597,"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/posts\/7704\/revisions\/25597"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/media\/7705"}],"wp:attachment":[{"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/media?parent=7704"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/categories?post=7704"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/trustpair.com\/fr\/wp-json\/wp\/v2\/tags?post=7704"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}