{"id":756521,"date":"2026-03-16T21:30:15","date_gmt":"2026-03-16T20:30:15","guid":{"rendered":"https:\/\/www.stormshield.com\/?p=756521"},"modified":"2026-03-23T08:38:48","modified_gmt":"2026-03-23T07:38:48","slug":"technique-clickfix-cybermenace-en-forte-croissance","status":"publish","type":"post","link":"https:\/\/www.stormshield.com\/fr\/actus\/technique-clickfix-cybermenace-en-forte-croissance\/","title":{"rendered":"La technique ClickFix : une cyber-menace en forte croissance"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"full_width\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\"][vc_column][vc_column_text css=\"\"]<\/p>\n<h2>Introduction<\/h2>\n<p>Dans un contexte de multiplication importante des cyberattaques, les cyber-criminels d\u00e9veloppent constamment de nouvelles techniques pour pi\u00e9ger les utilisateurs. Parmi celles r\u00e9cemment industrialis\u00e9es, la technique ClickFix conna\u00eet une forte progression <a href=\"https:\/\/www.elastic.co\/fr\/security-labs\/a-wretch-client\" target=\"_blank\" rel=\"noopener\">depuis sa premi\u00e8re d\u00e9tection en mars 2024<\/a>.<\/p>\n<p>Elle repose sur l'ing\u00e9nierie sociale pour exploiter la confiance des internautes et les inciter \u00e0 ex\u00e9cuter eux-m\u00eames une commande malveillante sur leur machine, elle est devenue l'une des m\u00e9thodes d'attaque\u00a0les plus efficaces et r\u00e9pandues en ce moment <a href=\"https:\/\/cdn-dynmedia-1.microsoft.com\/is\/content\/microsoftcorp\/microsoft\/bade\/documents\/products-and-services\/en-us\/security\/Microsoft-Digital-Defense-Report-2025-v5-21Nov25.pdf\" target=\"_blank\" rel=\"noopener\">selon un\u00a0rapport\u00a0de Microsoft<\/a> datant de 2025, qui indique que <strong>47% des acc\u00e8s initiaux proviennent de la technique du ClickFix<\/strong>.<\/p>\n<p>&nbsp;<\/p>\n<h2>C'est quoi la technique ClickFix\u00a0?<\/h2>\n<p>La technique ClickFix est <strong>une m\u00e9thode d'ing\u00e9nierie sociale en deux \u00e9tapes,<\/strong> o\u00f9 les cyber-criminels simulent d'abord une panne ou d\u00e9faillance, puis proposent une solution rassurante qui trompe\u00a0l'utilisateur pour qu'il ex\u00e9cute lui-m\u00eame une commande malveillante sur sa propre machine.<\/p>\n<p>Le principe est qu'un site compromis ou une page de phishing d\u00e9di\u00e9e affiche une fausse alerte de s\u00e9curit\u00e9 (CAPTCHA anti-bot, erreur du navigateur, blocage Cloudflare, etc.) et expose un message guidant l'utilisateur. Par exemple\u00a0:[\/vc_column_text][vc_empty_space][\/vc_column][\/vc_row][vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"full_width\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\" z_index=\"\" background_color=\"#7CBDE4\" side_padding=\"10\" padding_top=\"25\" padding_bottom=\"25\"][vc_column][vc_column_text css=\"\"]<span style=\"color: #ffffff;\"><strong>Pour r\u00e9parer le probl\u00e8me, veuillez effectuer ceci :<\/strong><\/span><\/p>\n<ol>\n<li><span style=\"color: #ffffff;\">Appuyez sur Windows + R<\/span><\/li>\n<li><span style=\"color: #ffffff;\">Dans la fen\u00eatre qui s'ouvre, appuyez sur Ctrl + V (la commande malveillante \u00e9tant copi\u00e9e directement dans le presse-papiers par un code Javascript en arri\u00e8re plan)<\/span><\/li>\n<li><span style=\"color: #ffffff;\">Appuyez sur Entr\u00e9e<\/span><\/li>\n<\/ol>\n<p>[\/vc_column_text][vc_empty_space][\/vc_column][\/vc_row][vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"full_width\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\"][vc_column][vc_column_text css=\"\"]Ou encore :[\/vc_column_text][vc_empty_space][\/vc_column][\/vc_row][vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"full_width\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\" z_index=\"\" background_color=\"#7CBDE4\" side_padding=\"10\" padding_top=\"25\" padding_bottom=\"25\"][vc_column][vc_column_text css=\"\"]<span style=\"color: #ffffff;\"><strong>Pour r\u00e9parer le probl\u00e8me, veuillez effectuer ceci\u00a0:<\/strong><\/span><\/p>\n<ol>\n<li><span style=\"color: #ffffff;\">Cliquez sur le bouton \"copier\" ci-dessus<\/span><\/li>\n<li><span style=\"color: #ffffff;\">Appuyez sur Windows + X<\/span><\/li>\n<li><span style=\"color: #ffffff;\">Ouvrir le terminal en tant que administrateur<\/span><\/li>\n<li><span style=\"color: #ffffff;\">Dans la fen\u00eatre qui s'ouvre, appuyez sur Ctrl + V puis Entr\u00e9e<\/span><\/li>\n<\/ol>\n<p>[\/vc_column_text][vc_empty_space][\/vc_column][\/vc_row][vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"full_width\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\"][vc_column][vc_column_text css=\"\"]L'utilisateur pense r\u00e9parer un probl\u00e8me technique, mais en r\u00e9alit\u00e9 lance le premier maillon de la cha\u00eene d'attaque (t\u00e9l\u00e9chargement, ex\u00e9cution de malware, ou tout autre action malveillante).<\/p>\n<p>L\u2019illustration ci-dessous montre un exemple concret, avec usurpation de l'identit\u00e9 d'une marque r\u00e9put\u00e9e dans la r\u00e9servation d'h\u00f4tels\u00a0:[\/vc_column_text][vc_empty_space][\/vc_column][\/vc_row][vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"full_width\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\"][vc_column][vc_single_image image=\"760824\" img_size=\"large\" alignment=\"center\" css=\"\" qode_css_animation=\"\"][vc_empty_space][\/vc_column][\/vc_row][vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"full_width\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\"][vc_column][vc_column_text css=\"\"]Le sch\u00e9ma ci-dessous montre le d\u00e9roulement complet d'une attaque ClickFix, du clic initial sur le site malveillant jusqu'au d\u00e9ploiement du malware.[\/vc_column_text][vc_empty_space][\/vc_column][\/vc_row][vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"full_width\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\"][vc_column][vc_single_image image=\"760814\" img_size=\"large\" alignment=\"center\" onclick=\"link_image\" css=\"\" qode_css_animation=\"\"][vc_empty_space][\/vc_column][\/vc_row][vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"full_width\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\"][vc_column][vc_column_text css=\"\"]<\/p>\n<h2>Pourquoi cette technique est-elle efficace ?<\/h2>\n<p>La technique ClickFix exploite la psychologie humaine avec :<\/p>\n<ul>\n<li>Un sentiment\u00a0de frustration face \u00e0 un dysfonctionnement\u00a0(biais cognitif li\u00e9 \u00e0 la peur de ne pas pouvoir r\u00e9cup\u00e9rer ce que l\u2019utilisateur \u00e9tait venu chercher)<\/li>\n<li>L'apparence l\u00e9gitime de syst\u00e8mes connus (CAPTCHA Cloudflare, v\u00e9rification navigateur...)<\/li>\n<li>Des fausses erreurs techniques famili\u00e8res (sentiment de compr\u00e9hension du \"probl\u00e8me\" par l'utilisateur, sans \u00e9veiller sa m\u00e9fiance)<\/li>\n<li>Des instructions ultra-simples (quelques frappes claviers et clics de souris\u00a0: effort faible n\u00e9cessaire pour r\u00e9soudre le \"probl\u00e8me\")<\/li>\n<li>Une m\u00e9connaissance des outils et des commandes utilis\u00e9s (l\u2019utilisateur ex\u00e9cute sans comprendre la port\u00e9e r\u00e9elle des actions demand\u00e9es)<\/li>\n<\/ul>\n<p>L'utilisateur devient acteur et ex\u00e9cute\u00a0lui-m\u00eame\u00a0la menace,\u00a0contournant\u00a0ainsi les protections techniques classiques par une ex\u00e9cution manuelle et souvent obfusqu\u00e9e (long espace vide cachant la v\u00e9ritable commande malveillante)\u00a0:<\/p>\n<ul>\n<li>Navigateurs : m\u00e9canismes d'isolation \/ sandbox, analyse dynamique de contenu (scripts...), listes de blocage d'URL, outils type Safe Browsing<\/li>\n<li>Antivirus : d\u00e9tection statique (signatures de fichiers)<\/li>\n<li>EDR (Endpoint Detection and Response) : analyse de t\u00e9l\u00e9chargements HTTP\/HTTPS, surveillance des processus lanc\u00e9s<\/li>\n<\/ul>\n<p>Cette approche s\u2019appuie fr\u00e9quemment sur l\u2019usage de\u00a0<a class=\"external-link\" href=\"https:\/\/lolbas-project.github.io\/\" target=\"_blank\" rel=\"nofollow noopener\">LOLBAS (Living Off The Land Binaries and Scripts)<\/a>\u00a0: des outils l\u00e9gitimes d\u00e9j\u00e0 pr\u00e9sents sur le syst\u00e8me (comme PowerShell) d\u00e9tourn\u00e9s \u00e0 des fins malveillantes, rendant la d\u00e9tection plus difficile.[\/vc_column_text][vc_empty_space][\/vc_column][\/vc_row][vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"full_width\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\"][vc_column][vc_column_text css=\"\"]<\/p>\n<h2>Une technique en forte croissance<\/h2>\n<p>Depuis sa premi\u00e8re observation en mars 2024, les experts en cybers\u00e9curit\u00e9 observent une augmentation tr\u00e8s rapide des attaques ClickFix. ESET rapporte ainsi <a href=\"https:\/\/www.eset.com\/fr\/about\/newsroom\/press-releases\/recherche\/eset-devoile-rapport-cybermenaces-2025\/\" target=\"_blank\" rel=\"noopener\">une hausse de 500% des d\u00e9tections<\/a> entre fin 2024 et mi-2025.<\/p>\n<p>Selon la classification\u00a0MITRE\u202fATT&amp;CK, ClickFix s\u2019inscrit dans la tactique\u00a0<strong><a class=\"external-link\" href=\"https:\/\/attack.mitre.org\/tactics\/TA0002\/\" target=\"_blank\" rel=\"nofollow noopener\">Ex\u00e9cution (Execution)<\/a><\/strong>, sous la technique\u00a0<a class=\"external-link\" href=\"https:\/\/attack.mitre.org\/techniques\/T1204\/\" target=\"_blank\" rel=\"nofollow noopener\"><strong>T1204<\/strong>\u00a0-\u00a0<strong>User Execution<\/strong><\/a>, et plus pr\u00e9cis\u00e9ment la sous\u2011technique\u00a0<strong><a class=\"external-link\" href=\"https:\/\/attack.mitre.org\/techniques\/T1204\/004\/\" target=\"_blank\" rel=\"nofollow noopener\">T1204.004 - Malicious Copy and Paste<\/a><\/strong>.<\/p>\n<p>Cette technique, d\u00e9sormais <a href=\"https:\/\/web-assets.esetstatic.com\/wls\/en\/papers\/threat-reports\/eset-threat-report-h12025.pdf\" target=\"_blank\" rel=\"noopener\">observ\u00e9e sur diff\u00e9rents syst\u00e8mes d\u2019exploitation<\/a> (Windows, macOS, Linux), est utilis\u00e9e par <a href=\"https:\/\/sosransomware.com\/cybersecurite\/clickfix-attaque-qui-transforme-les-utilisateurs-en-complices-de-leur-propre-infection\/\" target=\"_blank\" rel=\"noopener\">une large vari\u00e9t\u00e9 d\u2019acteurs malveillants<\/a>\u00a0:<\/p>\n<ul>\n<li>Des cybercriminels ind\u00e9pendants<\/li>\n<li>Des groupes sp\u00e9cialis\u00e9s dans le vol de donn\u00e9es (infostealers)<\/li>\n<li>Des acteurs \u00e9tatiques<\/li>\n<\/ul>\n<p>Elle est aussi devenue un vecteur d'infection important <a href=\"https:\/\/sosransomware.com\/cybersecurite\/clickfix-attaque-qui-transforme-les-utilisateurs-en-complices-de-leur-propre-infection\/\" target=\"_blank\" rel=\"noopener\">pour des campagnes de malwares<\/a> comme Latrodectus, Lumma Stealer, NetSupport RAT.<\/p>\n<p>Voici les chiffres de 2024\/2025 selon Proofpoint\u00a0:[\/vc_column_text][vc_empty_space][\/vc_column][\/vc_row][vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"full_width\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\"][vc_column][vc_single_image image=\"760819\" img_size=\"large\" alignment=\"center\" css=\"\" qode_css_animation=\"\"][vc_empty_space][\/vc_column][\/vc_row][vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"full_width\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\"][vc_column][vc_column_text css=\"\"]<\/p>\n<h2>Conclusion<\/h2>\n<p>La technique ClickFix illustre l'efficacit\u00e9 des cyberattaques d'ing\u00e9nierie sociale : en exploitant la confiance des utilisateurs, les cybercriminels les incitent \u00e0 d\u00e9ployer eux-m\u00eames des malwares. Ils passent ainsi outre les outils de s\u00e9curit\u00e9 \u00e0 disposition.<\/p>\n<p>Les cybercriminels perfectionnent en continu cette technique pour la rendre plus persuasive. L'\u00e9volution principale de la technique repose <a href=\"https:\/\/www.bridewell.com\/insights\/blogs\/detail\/filefix-the-evolved-clickfix\" target=\"_blank\" rel=\"noopener\">sur l'\u00e9mergence de variantes comme FileFix<\/a>, qui simule l'Explorateur Windows au lieu de la bo\u00eete de dialogue \"Ex\u00e9cuter\", incitant l'utilisateur \u00e0 ouvrir un fichier malveillant via une interface famili\u00e8re.<\/p>\n<p>La vigilance et la\u00a0sensibilisation des utilisateurs reste la meilleure d\u00e9fense, notamment face \u00e0 des consignes suspectes comme l\u2019ouverture de Win + R.<\/p>\n<p>Dans\u00a0un prochain billet, <strong>l'\u00e9quipe de Cyber Threat Intelligence de Stormshield pr\u00e9sentera une analyse d\u00e9taill\u00e9e d'une cha\u00eene d'attaque ClickFix, incluant l'\u00e9tude des charges malveillantes et les \u00e9tapes techniques de l'attaque.<\/strong>[\/vc_column_text][vc_empty_space][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row css_animation=\u00a0\u00bb\u00a0\u00bb row_type=\u00a0\u00bbrow\u00a0\u00bb use_row_as_full_screen_section=\u00a0\u00bbno\u00a0\u00bb type=\u00a0\u00bbfull_width\u00a0\u00bb angled_section=\u00a0\u00bbno\u00a0\u00bb text_align=\u00a0\u00bbleft\u00a0\u00bb background_image_as_pattern=\u00a0\u00bbwithout_pattern\u00a0\u00bb][vc_column][vc_column_text css=\u00a0\u00bb\u00a0\u00bb] Introduction Dans un contexte de multiplication importante des cyberattaques, les cyber-criminels d\u00e9veloppent constamment de nouvelles techniques pour pi\u00e9ger les utilisateurs. Parmi celles r\u00e9cemment industrialis\u00e9es, la technique ClickFix conna\u00eet une forte progression depuis sa premi\u00e8re d\u00e9tection en&#8230;<\/p>\n","protected":false},"author":83,"featured_media":760848,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7065],"tags":[4368],"business_size":[],"industry":[],"help_mefind":[],"features":[],"type_security":[],"maintenance":[],"offer":[],"administration_tools":[],"cloud_offers":[],"listing_product":[],"class_list":["post-756521","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technical-posts-fr","tag-la-cybersecurite-par-stormshield"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tout Savoir sur la Technique ClickFix<\/title>\n<meta name=\"description\" content=\"En forte progression, la technique ClickFix repose sur l&#039;ing\u00e9nierie sociale pour exploiter la confiance des internautes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stormshield.com\/fr\/actus\/technique-clickfix-cybermenace-en-forte-croissance\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tout Savoir sur la Technique ClickFix\" \/>\n<meta property=\"og:description\" content=\"En forte progression, la technique ClickFix repose sur l&#039;ing\u00e9nierie sociale pour exploiter la confiance des internautes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stormshield.com\/fr\/actus\/technique-clickfix-cybermenace-en-forte-croissance\/\" \/>\n<meta property=\"og:site_name\" content=\"Stormshield\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-16T20:30:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-23T07:38:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock-1661616295.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Stormshield Customer Security Lab\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:site\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Stormshield Customer Security Lab\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/technique-clickfix-cybermenace-en-forte-croissance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/technique-clickfix-cybermenace-en-forte-croissance\/\"},\"author\":{\"name\":\"Stormshield Customer Security Lab\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/a05f467cec789f90c8a355b178743249\"},\"headline\":\"La technique ClickFix : une cyber-menace en forte croissance\",\"datePublished\":\"2026-03-16T20:30:15+00:00\",\"dateModified\":\"2026-03-23T07:38:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/technique-clickfix-cybermenace-en-forte-croissance\/\"},\"wordCount\":1511,\"image\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/technique-clickfix-cybermenace-en-forte-croissance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock-1661616295.jpg\",\"keywords\":[\"La cybers\u00e9curit\u00e9 - par Stormshield\"],\"articleSection\":[\"Billets techniques\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/technique-clickfix-cybermenace-en-forte-croissance\/\",\"url\":\"https:\/\/www.stormshield.com\/fr\/actus\/technique-clickfix-cybermenace-en-forte-croissance\/\",\"name\":\"Tout Savoir sur la Technique ClickFix\",\"isPartOf\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/technique-clickfix-cybermenace-en-forte-croissance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/technique-clickfix-cybermenace-en-forte-croissance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock-1661616295.jpg\",\"datePublished\":\"2026-03-16T20:30:15+00:00\",\"dateModified\":\"2026-03-23T07:38:48+00:00\",\"author\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/a05f467cec789f90c8a355b178743249\"},\"description\":\"En forte progression, la technique ClickFix repose sur l'ing\u00e9nierie sociale pour exploiter la confiance des internautes.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/technique-clickfix-cybermenace-en-forte-croissance\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stormshield.com\/fr\/actus\/technique-clickfix-cybermenace-en-forte-croissance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/technique-clickfix-cybermenace-en-forte-croissance\/#primaryimage\",\"url\":\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock-1661616295.jpg\",\"contentUrl\":\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock-1661616295.jpg\",\"width\":2500,\"height\":1600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/technique-clickfix-cybermenace-en-forte-croissance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stormshield.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"La technique ClickFix : une cyber-menace en forte croissance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/#website\",\"url\":\"https:\/\/www.stormshield.com\/fr\/\",\"name\":\"Stormshield\",\"description\":\"Stormshield\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stormshield.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/a05f467cec789f90c8a355b178743249\",\"name\":\"Stormshield Customer Security Lab\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/46b9416c400398c1a9fc878c7a35bd2ae4f79caeeda138facd5cb65a4ab91c5d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/46b9416c400398c1a9fc878c7a35bd2ae4f79caeeda138facd5cb65a4ab91c5d?s=96&d=mm&r=g\",\"caption\":\"Stormshield Customer Security Lab\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tout Savoir sur la Technique ClickFix","description":"En forte progression, la technique ClickFix repose sur l'ing\u00e9nierie sociale pour exploiter la confiance des internautes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stormshield.com\/fr\/actus\/technique-clickfix-cybermenace-en-forte-croissance\/","og_locale":"fr_FR","og_type":"article","og_title":"Tout Savoir sur la Technique ClickFix","og_description":"En forte progression, la technique ClickFix repose sur l'ing\u00e9nierie sociale pour exploiter la confiance des internautes.","og_url":"https:\/\/www.stormshield.com\/fr\/actus\/technique-clickfix-cybermenace-en-forte-croissance\/","og_site_name":"Stormshield","article_published_time":"2026-03-16T20:30:15+00:00","article_modified_time":"2026-03-23T07:38:48+00:00","og_image":[{"width":2500,"height":1600,"url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock-1661616295.jpg","type":"image\/jpeg"}],"author":"Stormshield Customer Security Lab","twitter_card":"summary_large_image","twitter_creator":"@Stormshield","twitter_site":"@Stormshield","twitter_misc":{"\u00c9crit par":"Stormshield Customer Security Lab","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stormshield.com\/fr\/actus\/technique-clickfix-cybermenace-en-forte-croissance\/#article","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/technique-clickfix-cybermenace-en-forte-croissance\/"},"author":{"name":"Stormshield Customer Security Lab","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/a05f467cec789f90c8a355b178743249"},"headline":"La technique ClickFix : une cyber-menace en forte croissance","datePublished":"2026-03-16T20:30:15+00:00","dateModified":"2026-03-23T07:38:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/technique-clickfix-cybermenace-en-forte-croissance\/"},"wordCount":1511,"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/technique-clickfix-cybermenace-en-forte-croissance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock-1661616295.jpg","keywords":["La cybers\u00e9curit\u00e9 - par Stormshield"],"articleSection":["Billets techniques"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.stormshield.com\/fr\/actus\/technique-clickfix-cybermenace-en-forte-croissance\/","url":"https:\/\/www.stormshield.com\/fr\/actus\/technique-clickfix-cybermenace-en-forte-croissance\/","name":"Tout Savoir sur la Technique ClickFix","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/technique-clickfix-cybermenace-en-forte-croissance\/#primaryimage"},"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/technique-clickfix-cybermenace-en-forte-croissance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock-1661616295.jpg","datePublished":"2026-03-16T20:30:15+00:00","dateModified":"2026-03-23T07:38:48+00:00","author":{"@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/a05f467cec789f90c8a355b178743249"},"description":"En forte progression, la technique ClickFix repose sur l'ing\u00e9nierie sociale pour exploiter la confiance des internautes.","breadcrumb":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/technique-clickfix-cybermenace-en-forte-croissance\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stormshield.com\/fr\/actus\/technique-clickfix-cybermenace-en-forte-croissance\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.stormshield.com\/fr\/actus\/technique-clickfix-cybermenace-en-forte-croissance\/#primaryimage","url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock-1661616295.jpg","contentUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock-1661616295.jpg","width":2500,"height":1600},{"@type":"BreadcrumbList","@id":"https:\/\/www.stormshield.com\/fr\/actus\/technique-clickfix-cybermenace-en-forte-croissance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stormshield.com\/fr\/"},{"@type":"ListItem","position":2,"name":"La technique ClickFix : une cyber-menace en forte croissance"}]},{"@type":"WebSite","@id":"https:\/\/www.stormshield.com\/fr\/#website","url":"https:\/\/www.stormshield.com\/fr\/","name":"Stormshield","description":"Stormshield","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stormshield.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/a05f467cec789f90c8a355b178743249","name":"Stormshield Customer Security Lab","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/46b9416c400398c1a9fc878c7a35bd2ae4f79caeeda138facd5cb65a4ab91c5d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/46b9416c400398c1a9fc878c7a35bd2ae4f79caeeda138facd5cb65a4ab91c5d?s=96&d=mm&r=g","caption":"Stormshield Customer Security Lab"}}]}},"_links":{"self":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/756521","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/comments?post=756521"}],"version-history":[{"count":9,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/756521\/revisions"}],"predecessor-version":[{"id":769437,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/756521\/revisions\/769437"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media\/760848"}],"wp:attachment":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media?parent=756521"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/categories?post=756521"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/tags?post=756521"},{"taxonomy":"business_size","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/business_size?post=756521"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/industry?post=756521"},{"taxonomy":"help_mefind","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/help_mefind?post=756521"},{"taxonomy":"features","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/features?post=756521"},{"taxonomy":"type_security","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/type_security?post=756521"},{"taxonomy":"maintenance","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/maintenance?post=756521"},{"taxonomy":"offer","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/offer?post=756521"},{"taxonomy":"administration_tools","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/administration_tools?post=756521"},{"taxonomy":"cloud_offers","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/cloud_offers?post=756521"},{"taxonomy":"listing_product","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/listing_product?post=756521"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}