{"id":2873,"date":"2021-01-04T16:38:00","date_gmt":"2021-01-04T15:38:00","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=2873"},"modified":"2021-01-05T16:42:16","modified_gmt":"2021-01-05T15:42:16","slug":"t-mobile-pirate-et-des-entregistrements-dappels-des-clients-auraient-ete-voles","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/t-mobile-pirate-et-des-entregistrements-dappels-des-clients-auraient-ete-voles\/","title":{"rendered":"T-MOBILE PIRAT\u00c9 ET DES ENTREGISTREMENTS D&rsquo;APPELS DES CLIENTS AURAIENT \u00c9T\u00c9 VOL\u00c9S"},"content":{"rendered":"\n<p>Un rapport r\u00e9v\u00e8le que des hackers pourraient avoir acc\u00e9d\u00e9 aux enregistrements d&rsquo;appels de certains clients de T-Mobile lors d&rsquo;une violation r\u00e9cente.<\/p>\n\n\n\n<p>Cependant, T-Mobile affirme que <strong><a href=\"https:\/\/blog.koddos.net\/unpatched-voip-flaws-lead-to-a-massive-wave-of-hacking-attacks\/\">l&rsquo;attaque de piratage<\/a> <\/strong>n&rsquo;a pas r\u00e9v\u00e9l\u00e9 les noms, adresses \u00e9lectroniques, adresses physiques, mots de passe, num\u00e9ros d&rsquo;identification fiscale, num\u00e9ros de s\u00e9curit\u00e9 sociale ou informations de carte de cr\u00e9dit des clients.<\/p>\n\n\n\n<p><strong>Des hackers ont compromis les enregistrements d&rsquo;appels des clients<\/strong><\/p>\n\n\n\n<p>L&rsquo;incident de piratage a \u00e9t\u00e9 initialement signal\u00e9 par Bleeping Computer avant que T-Mobile ne confirme l&rsquo;incident. Selon le g\u00e9ant des t\u00e9l\u00e9communications, les acteurs de la menace ont acc\u00e9d\u00e9 aux informations propri\u00e9taires du r\u00e9seau (CPNI) de ses clients, y compris les enregistrements d&rsquo;appels et les num\u00e9ros de t\u00e9l\u00e9phone.<\/p>\n\n\n\n<p>\u00ab\u00a0Les informations sur le r\u00e9seau propri\u00e9taire des clients (CPNI), telles que d\u00e9finies par les r\u00e8gles de la <strong><a href=\"https:\/\/telecom.economictimes.indiatimes.com\/tag\/federal+communications+commission\">Commission f\u00e9d\u00e9rale des communications (FCC)<\/a><\/strong>, ont \u00e9t\u00e9 consult\u00e9es\u00a0\u00bb, a d\u00e9clar\u00e9 T-Mobile.<\/p>\n\n\n\n<p>Le site web de T-Mobile indique que les hackers ont pu acc\u00e9der aux donn\u00e9es des clients, y compris les donn\u00e9es soumises par les clients et celles faites par T-Mobile.<\/p>\n\n\n\n<p>Suite \u00e0 l&rsquo;attaque d\u00e9couverte, la soci\u00e9t\u00e9 a imm\u00e9diatement ferm\u00e9 ses syst\u00e8mes afin de prot\u00e9ger d&rsquo;autres syst\u00e8mes et d&rsquo;arr\u00eater d&rsquo;autres attaques malveillantes.<\/p>\n\n\n\n<p><strong>Les donn\u00e9es des comptes pr\u00e9pay\u00e9s sont \u00e9galement compromises<\/strong><\/p>\n\n\n\n<p>T-Mobile a r\u00e9v\u00e9l\u00e9 qu&rsquo;elle a commenc\u00e9 \u00e0 enqu\u00eater sur la situation et a contact\u00e9 les meilleurs experts am\u00e9ricains en mati\u00e8re de cybers\u00e9curit\u00e9 pour l&rsquo;aider dans son enqu\u00eate.<\/p>\n\n\n\n<p>La soci\u00e9t\u00e9 a d\u00e9clar\u00e9 que l&rsquo;enqu\u00eate vise \u00e0 d\u00e9terminer ce qu&rsquo;il est advenu des donn\u00e9es vol\u00e9es aux utilisateurs de T-Mobile. L&rsquo;entreprise a \u00e9galement signal\u00e9 l&rsquo;incident aux autorit\u00e9s polici\u00e8res am\u00e9ricaines et se pr\u00e9pare \u00e0 informer les clients qui pourraient \u00eatre touch\u00e9s.<\/p>\n\n\n\n<p>Le registre des appels auquel les hackers ont eu acc\u00e8s comprend des informations sur l&rsquo;heure de l&rsquo;appel, sa dur\u00e9e, la destination de chaque appel, le num\u00e9ro de t\u00e9l\u00e9phone de l&rsquo;appelant et d&rsquo;autres informations qui pourraient se trouver sur les factures du client.<\/p>\n\n\n\n<p>Le rapport n&rsquo;a pas r\u00e9v\u00e9l\u00e9 quand exactement T-Mobile a d\u00e9tect\u00e9 la violation, mais a d\u00e9clar\u00e9 que la soci\u00e9t\u00e9 n&rsquo;a pas encore inform\u00e9 les clients qui pourraient avoir \u00e9t\u00e9 touch\u00e9s.<\/p>\n\n\n\n<p><strong>0,2% des clients de T-Mobile<\/strong><\/p>\n\n\n\n<p>Un porte-parole de T-Mobile a d\u00e9clar\u00e9 que la violation n&rsquo;avait pas affect\u00e9 beaucoup de clients de T-Mobile, en disant que seulement 0,2 % des clients \u00e9taient touch\u00e9s.<\/p>\n\n\n\n<p>Toutefois, si l&rsquo;on consid\u00e8re la base de clients de la soci\u00e9t\u00e9, le nombre de clients touch\u00e9s pourrait atteindre 200 000. L&rsquo;incident de s\u00e9curit\u00e9 n&rsquo;est pas la premi\u00e8re fois que l&rsquo;entreprise est confront\u00e9e \u00e0 un probl\u00e8me de s\u00e9curit\u00e9 similaire.<\/p>\n\n\n\n<p>Le piratage de 2018 a \u00e9t\u00e9 plus important que le r\u00e9cent piratage en termes d&rsquo;impact sur les clients. \u00c0 cette date, l&rsquo;entreprise a d\u00e9clar\u00e9 que les informations personnelles d&rsquo;environ deux millions de clients pourraient avoir \u00e9t\u00e9 <strong><a href=\"https:\/\/blog.koddos.net\/email-accounts-of-finnish-mps-compromised-in-new-attack\/\">compromises<\/a><\/strong>. \u00c0 peine 12 mois apr\u00e8s l&rsquo;incident, T-Mobile a annonc\u00e9 que les hackers avaient pu compromettre les dossiers personnels d&rsquo;un million de clients pr\u00e9pay\u00e9s suppl\u00e9mentaires. Mais T-Mobile n&rsquo;a pas r\u00e9v\u00e9l\u00e9 si les hackers des deux attaques ont un lien entre eux.<\/p>\n\n\n\n<p><strong>T-Mobile a subi davantage d&rsquo;attaques dans le pass\u00e9<\/strong><\/p>\n\n\n\n<p>Vers le mois de mars de l&rsquo;ann\u00e9e derni\u00e8re, la soci\u00e9t\u00e9 a confirm\u00e9 un <strong><a href=\"https:\/\/www.zdnet.com\/article\/t-mobile-says-hacker-gained-access-to-employee-email-accounts-user-data\/\">rapport<\/a> <\/strong>de ZDNet selon lequel des hackers ont infiltr\u00e9 les syst\u00e8mes de courrier \u00e9lectronique de l&rsquo;entreprise. L&rsquo;attaque du d\u00e9but de l&rsquo;ann\u00e9e a r\u00e9v\u00e9l\u00e9 les informations financi\u00e8res de certains clients de T-Mobile, ainsi que leur num\u00e9ro de s\u00e9curit\u00e9 sociale et d&rsquo;autres informations sur leurs comptes.<\/p>\n\n\n\n<p>L&rsquo;attaque a eu acc\u00e8s \u00e0 plusieurs comptes d&#8217;employ\u00e9s de T-Mobile. Lors de cette m\u00eame attaque de piratage, les acteurs de la menace auraient compromis les donn\u00e9es de certains clients de T-Mobile.<\/p>\n\n\n\n<p>Les clients de T-Mobile et le public ont exprim\u00e9 leur m\u00e9pris pour l&rsquo;approche de la soci\u00e9t\u00e9 en mati\u00e8re de s\u00e9curit\u00e9 en raison des nombreuses attaques auxquelles la soci\u00e9t\u00e9 a d\u00fb faire face.<\/p>\n\n\n\n<p>Malgr\u00e9 les probl\u00e8mes de s\u00e9curit\u00e9, le g\u00e9ant des t\u00e9l\u00e9communications continue de se distinguer sur le march\u00e9. Il a r\u00e9cemment conclu un accord de fusion d&rsquo;environ 26 milliards de dollars avec Sprint. Actuellement, T-Mobile est le troisi\u00e8me op\u00e9rateur de centres d&rsquo;appels aux \u00c9tats-Unis en termes de capitalisation boursi\u00e8re. La soci\u00e9t\u00e9 a \u00e9tendu son march\u00e9 \u00e0 d&rsquo;autres r\u00e9gions et est visible dans plusieurs parties du monde.<\/p>\n\n\n\n<p>La <strong><a href=\"https:\/\/telecom.economictimes.indiatimes.com\/news\/t-mobile-customers-phone-numbers-call-records-exposed\/80090927\">derni\u00e8re violation<\/a><\/strong>, bien qu&rsquo;elle ne soit pas aussi massive que les pr\u00e9c\u00e9dentes, pourrait ternir l&rsquo;image de la soci\u00e9t\u00e9. Elle sert \u00e9galement \u00e0 rappeler que les hackers sont toujours \u00e0 la recherche de failles pour lancer des attaques sur les syst\u00e8mes et les r\u00e9seaux.<\/p>\n\n\n\n<p>Au moment de la r\u00e9daction du pr\u00e9sent document, les clients n&rsquo;avaient pas encore \u00e9t\u00e9 contact\u00e9s au sujet de la derni\u00e8re violation. Mais le mail contiendra des conseils sur les mesures que les clients devraient prendre pour \u00e9viter d&rsquo;\u00eatre victimes d&rsquo;attaques d&rsquo;extorsion.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Un rapport r\u00e9v\u00e8le que des hackers pourraient avoir acc\u00e9d\u00e9 aux enregistrements d&rsquo;appels de certains clients de T-Mobile lors d&rsquo;une violation r\u00e9cente. Cependant, T-Mobile affirme que l&rsquo;attaque de piratage n&rsquo;a pas r\u00e9v\u00e9l\u00e9 les noms, adresses \u00e9lectroniques, adresses physiques, mots de passe, num\u00e9ros d&rsquo;identification fiscale, num\u00e9ros de s\u00e9curit\u00e9 sociale ou informations de carte de cr\u00e9dit des clients. &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/t-mobile-pirate-et-des-entregistrements-dappels-des-clients-auraient-ete-voles\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">T-MOBILE PIRAT\u00c9 ET DES ENTREGISTREMENTS D&rsquo;APPELS DES CLIENTS AURAIENT \u00c9T\u00c9 VOL\u00c9S<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":2874,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[6],"tags":[],"class_list":["post-2873","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>T-MOBILE PIRAT\u00c9 ET DES ENTREGISTREMENTS D&#039;APPELS DES CLIENTS AURAIENT \u00c9T\u00c9 VOL\u00c9S - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/t-mobile-pirate-et-des-entregistrements-dappels-des-clients-auraient-ete-voles\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"T-MOBILE PIRAT\u00c9 ET DES ENTREGISTREMENTS D&#039;APPELS DES CLIENTS AURAIENT \u00c9T\u00c9 VOL\u00c9S - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"Un rapport r\u00e9v\u00e8le que des hackers pourraient avoir acc\u00e9d\u00e9 aux enregistrements d&rsquo;appels de certains clients de T-Mobile lors d&rsquo;une violation r\u00e9cente. Cependant, T-Mobile affirme que l&rsquo;attaque de piratage n&rsquo;a pas r\u00e9v\u00e9l\u00e9 les noms, adresses \u00e9lectroniques, adresses physiques, mots de passe, num\u00e9ros d&rsquo;identification fiscale, num\u00e9ros de s\u00e9curit\u00e9 sociale ou informations de carte de cr\u00e9dit des clients. &hellip; Continue reading T-MOBILE PIRAT\u00c9 ET DES ENTREGISTREMENTS D&rsquo;APPELS DES CLIENTS AURAIENT \u00c9T\u00c9 VOL\u00c9S\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/t-mobile-pirate-et-des-entregistrements-dappels-des-clients-auraient-ete-voles\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-04T15:38:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-05T15:42:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i2.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2021\/01\/T-Mobile-Hacked-with-Customers-Call-Records-Allegedly-Stolen.jpg?fit=640%2C433&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"433\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"KoDDoS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"KoDDoS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/t-mobile-pirate-et-des-entregistrements-dappels-des-clients-auraient-ete-voles\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/t-mobile-pirate-et-des-entregistrements-dappels-des-clients-auraient-ete-voles\\\/\"},\"author\":{\"name\":\"KoDDoS\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\"},\"headline\":\"T-MOBILE PIRAT\u00c9 ET DES ENTREGISTREMENTS D&rsquo;APPELS DES CLIENTS AURAIENT \u00c9T\u00c9 VOL\u00c9S\",\"datePublished\":\"2021-01-04T15:38:00+00:00\",\"dateModified\":\"2021-01-05T15:42:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/t-mobile-pirate-et-des-entregistrements-dappels-des-clients-auraient-ete-voles\\\/\"},\"wordCount\":935,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/t-mobile-pirate-et-des-entregistrements-dappels-des-clients-auraient-ete-voles\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/T-Mobile-Hacked-with-Customers-Call-Records-Allegedly-Stolen.jpg?fit=640%2C433&ssl=1\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/t-mobile-pirate-et-des-entregistrements-dappels-des-clients-auraient-ete-voles\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/t-mobile-pirate-et-des-entregistrements-dappels-des-clients-auraient-ete-voles\\\/\",\"name\":\"T-MOBILE PIRAT\u00c9 ET DES ENTREGISTREMENTS D'APPELS DES CLIENTS AURAIENT \u00c9T\u00c9 VOL\u00c9S - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/t-mobile-pirate-et-des-entregistrements-dappels-des-clients-auraient-ete-voles\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/t-mobile-pirate-et-des-entregistrements-dappels-des-clients-auraient-ete-voles\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/T-Mobile-Hacked-with-Customers-Call-Records-Allegedly-Stolen.jpg?fit=640%2C433&ssl=1\",\"datePublished\":\"2021-01-04T15:38:00+00:00\",\"dateModified\":\"2021-01-05T15:42:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/t-mobile-pirate-et-des-entregistrements-dappels-des-clients-auraient-ete-voles\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/t-mobile-pirate-et-des-entregistrements-dappels-des-clients-auraient-ete-voles\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/t-mobile-pirate-et-des-entregistrements-dappels-des-clients-auraient-ete-voles\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/T-Mobile-Hacked-with-Customers-Call-Records-Allegedly-Stolen.jpg?fit=640%2C433&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/T-Mobile-Hacked-with-Customers-Call-Records-Allegedly-Stolen.jpg?fit=640%2C433&ssl=1\",\"width\":640,\"height\":433},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/t-mobile-pirate-et-des-entregistrements-dappels-des-clients-auraient-ete-voles\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"T-MOBILE PIRAT\u00c9 ET DES ENTREGISTREMENTS D&rsquo;APPELS DES CLIENTS AURAIENT \u00c9T\u00c9 VOL\u00c9S\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\",\"name\":\"KoDDoS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"caption\":\"KoDDoS\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/oiyndjepop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"T-MOBILE PIRAT\u00c9 ET DES ENTREGISTREMENTS D'APPELS DES CLIENTS AURAIENT \u00c9T\u00c9 VOL\u00c9S - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/t-mobile-pirate-et-des-entregistrements-dappels-des-clients-auraient-ete-voles\/","og_locale":"fr_FR","og_type":"article","og_title":"T-MOBILE PIRAT\u00c9 ET DES ENTREGISTREMENTS D'APPELS DES CLIENTS AURAIENT \u00c9T\u00c9 VOL\u00c9S - Blog KoDDoS","og_description":"Un rapport r\u00e9v\u00e8le que des hackers pourraient avoir acc\u00e9d\u00e9 aux enregistrements d&rsquo;appels de certains clients de T-Mobile lors d&rsquo;une violation r\u00e9cente. Cependant, T-Mobile affirme que l&rsquo;attaque de piratage n&rsquo;a pas r\u00e9v\u00e9l\u00e9 les noms, adresses \u00e9lectroniques, adresses physiques, mots de passe, num\u00e9ros d&rsquo;identification fiscale, num\u00e9ros de s\u00e9curit\u00e9 sociale ou informations de carte de cr\u00e9dit des clients. &hellip; Continue reading T-MOBILE PIRAT\u00c9 ET DES ENTREGISTREMENTS D&rsquo;APPELS DES CLIENTS AURAIENT \u00c9T\u00c9 VOL\u00c9S","og_url":"https:\/\/fr.koddos.net\/blog\/t-mobile-pirate-et-des-entregistrements-dappels-des-clients-auraient-ete-voles\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2021-01-04T15:38:00+00:00","article_modified_time":"2021-01-05T15:42:16+00:00","og_image":[{"width":640,"height":433,"url":"https:\/\/i2.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2021\/01\/T-Mobile-Hacked-with-Customers-Call-Records-Allegedly-Stolen.jpg?fit=640%2C433&ssl=1","type":"image\/jpeg"}],"author":"KoDDoS","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"KoDDoS","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/t-mobile-pirate-et-des-entregistrements-dappels-des-clients-auraient-ete-voles\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/t-mobile-pirate-et-des-entregistrements-dappels-des-clients-auraient-ete-voles\/"},"author":{"name":"KoDDoS","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85"},"headline":"T-MOBILE PIRAT\u00c9 ET DES ENTREGISTREMENTS D&rsquo;APPELS DES CLIENTS AURAIENT \u00c9T\u00c9 VOL\u00c9S","datePublished":"2021-01-04T15:38:00+00:00","dateModified":"2021-01-05T15:42:16+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/t-mobile-pirate-et-des-entregistrements-dappels-des-clients-auraient-ete-voles\/"},"wordCount":935,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/t-mobile-pirate-et-des-entregistrements-dappels-des-clients-auraient-ete-voles\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2021\/01\/T-Mobile-Hacked-with-Customers-Call-Records-Allegedly-Stolen.jpg?fit=640%2C433&ssl=1","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/t-mobile-pirate-et-des-entregistrements-dappels-des-clients-auraient-ete-voles\/","url":"https:\/\/fr.koddos.net\/blog\/t-mobile-pirate-et-des-entregistrements-dappels-des-clients-auraient-ete-voles\/","name":"T-MOBILE PIRAT\u00c9 ET DES ENTREGISTREMENTS D'APPELS DES CLIENTS AURAIENT \u00c9T\u00c9 VOL\u00c9S - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/t-mobile-pirate-et-des-entregistrements-dappels-des-clients-auraient-ete-voles\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/t-mobile-pirate-et-des-entregistrements-dappels-des-clients-auraient-ete-voles\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2021\/01\/T-Mobile-Hacked-with-Customers-Call-Records-Allegedly-Stolen.jpg?fit=640%2C433&ssl=1","datePublished":"2021-01-04T15:38:00+00:00","dateModified":"2021-01-05T15:42:16+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/t-mobile-pirate-et-des-entregistrements-dappels-des-clients-auraient-ete-voles\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/t-mobile-pirate-et-des-entregistrements-dappels-des-clients-auraient-ete-voles\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/t-mobile-pirate-et-des-entregistrements-dappels-des-clients-auraient-ete-voles\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2021\/01\/T-Mobile-Hacked-with-Customers-Call-Records-Allegedly-Stolen.jpg?fit=640%2C433&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2021\/01\/T-Mobile-Hacked-with-Customers-Call-Records-Allegedly-Stolen.jpg?fit=640%2C433&ssl=1","width":640,"height":433},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/t-mobile-pirate-et-des-entregistrements-dappels-des-clients-auraient-ete-voles\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"T-MOBILE PIRAT\u00c9 ET DES ENTREGISTREMENTS D&rsquo;APPELS DES CLIENTS AURAIENT \u00c9T\u00c9 VOL\u00c9S"}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85","name":"KoDDoS","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","caption":"KoDDoS"},"url":"https:\/\/fr.koddos.net\/blog\/author\/oiyndjepop\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2021\/01\/T-Mobile-Hacked-with-Customers-Call-Records-Allegedly-Stolen.jpg?fit=640%2C433&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-Kl","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/2873","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=2873"}],"version-history":[{"count":1,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/2873\/revisions"}],"predecessor-version":[{"id":2875,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/2873\/revisions\/2875"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/2874"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=2873"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=2873"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=2873"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}