{"id":2454,"date":"2025-09-18T18:06:27","date_gmt":"2025-09-18T16:06:27","guid":{"rendered":"https:\/\/www.oneytrust.com\/?p=2454"},"modified":"2025-09-18T18:06:28","modified_gmt":"2025-09-18T16:06:28","slug":"merlin-network-anatomy-of-a-triangular-fraud-2","status":"publish","type":"post","link":"https:\/\/www.oneytrust.com\/fr\/merlin-network-anatomy-of-a-triangular-fraud-2\/","title":{"rendered":"R\u00e9seau MERLIN : anatomie d'une fraude triangulaire"},"content":{"rendered":"<h3 class=\"wp-block-heading\">What is triangular fraud?<\/h3>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"427\" height=\"426\" data-id=\"1702\" src=\"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/09\/MERLIN.jpg\" alt=\"\" class=\"wp-image-1702\" srcset=\"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/09\/MERLIN.jpg 427w, https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/09\/MERLIN-400x399.jpg 400w, https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/09\/MERLIN-12x12.jpg 12w\" sizes=\"auto, (max-width: 427px) 100vw, 427px\" \/><\/figure>\n<\/figure>\n\n\n\n<p>La fraude triangulaire est une m\u00e9thode complexe et ing\u00e9nieuse de fraude qui combine des \u00e9l\u00e9ments d'identit\u00e9s r\u00e9elles et synth\u00e9tiques pour cr\u00e9er un r\u00e9seau de transactions frauduleuses. Ce type de fraude repose sur l'interaction entre trois acteurs : le fraudeur, le vendeur l\u00e9gitime et le consommateur involontaire pour d\u00e9tourner des ressources de mani\u00e8re discr\u00e8te et efficace.<\/p>\n\n\n\n<p><strong>M\u00e9canisme de la fraude triangulaire \u202f:<\/strong><\/p>\n\n\n\n<p>Le processus de fraude triangulaire peut g\u00e9n\u00e9ralement \u00eatre d\u00e9compos\u00e9 en quatre \u00e9tapes :<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Cr\u00e9ation d'identit\u00e9s multiples<\/strong>: les fraudeurs commencent par cr\u00e9er des identit\u00e9s synth\u00e9tiques en combinant des informations r\u00e9elles et fictives, issues d\u2019informations clients r\u00e9elles re\u00e7ue lors d\u2019achat sur son site. Cela leur permet de g\u00e9n\u00e9rer des profils d'acheteurs cr\u00e9dibles qui peuvent interagir avec des vendeurs sans \u00e9veiller de soup\u00e7ons.<\/li>\n\n\n\n<li><strong>Commande de produits<\/strong>avec ces identit\u00e9s, les fraudeurs passent des commandes aupr\u00e8s de vendeurs l\u00e9gitimes. Le paiement est souvent effectu\u00e9 avec des cartes de cr\u00e9dit vol\u00e9es ou usurp\u00e9es.<\/li>\n\n\n\n<li><strong>R\u00e9exp\u00e9dition des produits<\/strong>: les produits achet\u00e9s sont exp\u00e9di\u00e9s \u00e0 des adresses interm\u00e9diaires ou directement chez le \u00ab\u202fvrai client\u202f\u00bb selon le mode op\u00e9ratoire utilis\u00e9. \u00c0 ce stade, les fraudeurs peuvent aussi vendre les produits fraud\u00e9s \u00e0 des acheteurs r\u00e9els via des plateformes en ligne \u00e0 un prix r\u00e9duit.<\/li>\n\n\n\n<li><strong>Encaissement<\/strong>: les fraudeurs encaissent les paiements des acheteurs r\u00e9els, tandis que le vendeur initial reste non pay\u00e9 ou est confront\u00e9 \u00e0 un chargeback.<\/li>\n<\/ol>\n\n\n\n<p><strong>Pourquoi la fraude triangulaire est-elle efficace ?<\/strong><\/p>\n\n\n\n<p>La fraude triangulaire est particuli\u00e8rement efficace en raison de son approche en r\u00e9seau, qui permet aux fraudeurs de dissocier les \u00e9l\u00e9ments de la transaction. Le vendeur initial croit interagir avec un acheteur l\u00e9gitime, tandis que l'acheteur final pense obtenir un produit \u00e0 un prix avantageux. Cette dissociation rend la d\u00e9tection difficile, les transactions individuelles pouvant sembler l\u00e9gitimes car les informations utilis\u00e9es sont r\u00e9elles avec de l\u2019anciennet\u00e9 et parfois m\u00eame de l\u2019activit\u00e9 saine. Les r\u00e8gles de s\u00e9curit\u00e9 classique ne sont pas capables de d\u00e9tecter ces signaux faibles de fraude.<\/p>\n\n\n\n<p><strong>Le r\u00e9seau MERLIN<\/strong><\/p>\n\n\n\n<p>Chez Oneytrust, nous d\u00e9tectons en permanence de nouveaux sch\u00e9mas frauduleux. L\u2019un des cas r\u00e9cents les plus parlants est celui d\u2019un r\u00e9seau que nous avons baptis\u00e9 \u00ab Merlin \u00bb, car il utilisait des produits de cette marque pour mener ses attaques. D\u00e9tect\u00e9 en juin 2024, ce r\u00e9seau illustre parfaitement la complexit\u00e9 et l\u2019\u00e9volution des menaces actuelles.<\/p>\n\n\n\n<p>Tout a commenc\u00e9 <strong>par une alerte sur des achats inhabituels<\/strong>: une forte hausse de commandes de jeux \u00e9ducatifs Merlin, d\u2019un montant inf\u00e9rieur \u00e0 100 \u20ac, chez un partenaire sp\u00e9cialis\u00e9 dans la pu\u00e9riculture. Ce pic soudain a imm\u00e9diatement attir\u00e9 notre attention.<\/p>\n\n\n\n<p>Nos experts ont rapidement rep\u00e9r\u00e9 <strong>des similarit\u00e9s entre les commandes<\/strong>, laissant pr\u00e9sager l\u2019existence d\u2019un r\u00e9seau organis\u00e9. Pourtant, certains \u00e9l\u00e9ments interpellent : les identit\u00e9s num\u00e9riques paraissent fiables, et certains profils appartiennent m\u00eame \u00e0 de v\u00e9ritables clients \u2013 mais avec une adresse e-mail diff\u00e9rente. Un signal clair d' <strong>usurpation d'identit\u00e9<\/strong>, rare pour ce type de petits montants.<\/p>\n\n\n\n<p>Pour lever le doute, nous avons contact\u00e9 les clients concern\u00e9s. Tous ont confirm\u00e9 leur identit\u00e9\u2026 mais ni\u00e9 avoir effectu\u00e9 ces achats. La fraude \u00e9tait d\u00e9sormais certaine. Un \u00e9change approfondi avec l\u2019un d\u2019eux nous a permis de d\u00e9couvrir la cl\u00e9 : il avait bien achet\u00e9 le produit, mais sur une marketplace en ligne, pas chez notre partenaire. Les preuves fournies ont permis d\u2019identifier la boutique frauduleuse et de comprendre le mode op\u00e9ratoire : <strong>une fraude triangulaire.<\/strong>.<\/p>\n\n\n\n<p>Une fois le sch\u00e9ma \u00e9tabli, nos analystes ont list\u00e9 <strong>les signaux communs aux commandes suspectes<\/strong> et cr\u00e9\u00e9 des r\u00e8gles de s\u00e9curit\u00e9 sp\u00e9cifiques. Gr\u00e2ce \u00e0 ces actions cibl\u00e9es, renforc\u00e9es par des v\u00e9rifications directes aupr\u00e8s des clients, nous avons pu bloquer les transactions li\u00e9es \u00e0 ce r\u00e9seau. <strong>R\u00e9sultat : en moins de 12 heures, le r\u00e9seau \u00ab Merlin \u00bb \u00e9tait neutralis\u00e9.<\/strong><\/p>\n\n\n\n<p>Cette affaire montre \u00e0 quel point <strong>la r\u00e9activit\u00e9 et l\u2019expertise de nos \u00e9quipes sont essentielles pour stopper de nouveaux r\u00e9seaux de fraude d\u00e8s leur apparition<\/strong>.Et l\u2019histoire de \u00ab Merlin \u00bb ne fait que commencer\u2026 nous vous en dirons plus tr\u00e8s bient\u00f4t.<\/p>","protected":false},"excerpt":{"rendered":"<p>What is triangular fraud? Triangular fraud is a complex and ingenious method of fraud that combines elements of real and synthetic identities to create a network of fraudulent transactions. This type of fraud relies on the interaction between three parties: the fraudster, the legitimate seller and the unwitting consumer, in order to divert resources discreetly&#8230;<\/p>","protected":false},"author":3,"featured_media":2455,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"footnotes":""},"categories":[6,1],"tags":[45,31,37,32,26,44,46],"class_list":["post-2454","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-expertise","category-general","tag-adn","tag-ecommerce","tag-fraude","tag-ia","tag-luttecontrelafraude","tag-securite","tag-technologie"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>AI at Oneytrust: technology at the heart of our DNA!<\/title>\n<meta name=\"description\" content=\"In the fight against fraud, the playing field is constantly changing. Fraudsters are now exploiting generative AI to industrialise phishing, create credible impersonations and automate attack scenarios. The result is a constant game of cat and mouse, where speed of adaptation makes all the difference. At Oneytrust, we have a simple belief: to counter AI-powered attackers, we must use AI better than fraudsters \u2014 without sacrificing customer experience or regulatory compliance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.oneytrust.com\/fr\/merlin-network-anatomy-of-a-triangular-fraud-2\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI at Oneytrust: technology at the heart of our DNA!\" \/>\n<meta property=\"og:description\" content=\"In the fight against fraud, the playing field is constantly changing. Fraudsters are now exploiting generative AI to industrialise phishing, create credible impersonations and automate attack scenarios. The result is a constant game of cat and mouse, where speed of adaptation makes all the difference. At Oneytrust, we have a simple belief: to counter AI-powered attackers, we must use AI better than fraudsters \u2014 without sacrificing customer experience or regulatory compliance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.oneytrust.com\/fr\/merlin-network-anatomy-of-a-triangular-fraud-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Oneytrust\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-18T16:06:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-18T16:06:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/09\/Etiquette_Linkedin_Fraude_Triangulaire.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"1200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Julie Breton\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Julie Breton\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.oneytrust.com\/merlin-network-anatomy-of-a-triangular-fraud-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.oneytrust.com\/merlin-network-anatomy-of-a-triangular-fraud-2\/\"},\"author\":{\"name\":\"Julie Breton\",\"@id\":\"https:\/\/www.oneytrust.com\/#\/schema\/person\/7468b32537747c2a80c28ba0064f7f4d\"},\"headline\":\"MERLIN network: anatomy of a triangular fraud\",\"datePublished\":\"2025-09-18T16:06:27+00:00\",\"dateModified\":\"2025-09-18T16:06:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.oneytrust.com\/merlin-network-anatomy-of-a-triangular-fraud-2\/\"},\"wordCount\":590,\"publisher\":{\"@id\":\"https:\/\/www.oneytrust.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.oneytrust.com\/merlin-network-anatomy-of-a-triangular-fraud-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/09\/Etiquette_Linkedin_Fraude_Triangulaire.png\",\"keywords\":[\"ADN\",\"ecommerce\",\"FRAUDE\",\"IA\",\"luttecontrelafraude\",\"s\u00e9curit\u00e9\",\"technologie\"],\"articleSection\":[\"Expertise\",\"General\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.oneytrust.com\/merlin-network-anatomy-of-a-triangular-fraud-2\/\",\"url\":\"https:\/\/www.oneytrust.com\/merlin-network-anatomy-of-a-triangular-fraud-2\/\",\"name\":\"AI at Oneytrust: technology at the heart of our DNA!\",\"isPartOf\":{\"@id\":\"https:\/\/www.oneytrust.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.oneytrust.com\/merlin-network-anatomy-of-a-triangular-fraud-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.oneytrust.com\/merlin-network-anatomy-of-a-triangular-fraud-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/09\/Etiquette_Linkedin_Fraude_Triangulaire.png\",\"datePublished\":\"2025-09-18T16:06:27+00:00\",\"dateModified\":\"2025-09-18T16:06:28+00:00\",\"description\":\"In the fight against fraud, the playing field is constantly changing. Fraudsters are now exploiting generative AI to industrialise phishing, create credible impersonations and automate attack scenarios. The result is a constant game of cat and mouse, where speed of adaptation makes all the difference. At Oneytrust, we have a simple belief: to counter AI-powered attackers, we must use AI better than fraudsters \u2014 without sacrificing customer experience or regulatory compliance.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.oneytrust.com\/merlin-network-anatomy-of-a-triangular-fraud-2\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.oneytrust.com\/merlin-network-anatomy-of-a-triangular-fraud-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.oneytrust.com\/merlin-network-anatomy-of-a-triangular-fraud-2\/#primaryimage\",\"url\":\"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/09\/Etiquette_Linkedin_Fraude_Triangulaire.png\",\"contentUrl\":\"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/09\/Etiquette_Linkedin_Fraude_Triangulaire.png\",\"width\":1200,\"height\":1200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.oneytrust.com\/merlin-network-anatomy-of-a-triangular-fraud-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.oneytrust.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"MERLIN network: anatomy of a triangular fraud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.oneytrust.com\/#website\",\"url\":\"https:\/\/www.oneytrust.com\/\",\"name\":\"Oneytrust\",\"description\":\"Only Trusted Customers. Oneytrust provides fraud detection and identity validation for merchants and banks. Unique consortia data, unbeatable fraud scoring.\",\"publisher\":{\"@id\":\"https:\/\/www.oneytrust.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.oneytrust.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.oneytrust.com\/#organization\",\"name\":\"Oneytrust\",\"url\":\"https:\/\/www.oneytrust.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.oneytrust.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/04\/oneytrust-logo.svg\",\"contentUrl\":\"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/04\/oneytrust-logo.svg\",\"width\":171,\"height\":40,\"caption\":\"Oneytrust\"},\"image\":{\"@id\":\"https:\/\/www.oneytrust.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.oneytrust.com\/#\/schema\/person\/7468b32537747c2a80c28ba0064f7f4d\",\"name\":\"Julie Breton\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.oneytrust.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7d778d89a656901040a5cb3d84c274d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7d778d89a656901040a5cb3d84c274d6?s=96&d=mm&r=g\",\"caption\":\"Julie Breton\"},\"url\":\"https:\/\/www.oneytrust.com\/fr\/author\/julie-breton\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"L\u2019IA chez Oneytrust : une technologie au coeur de notre ADN !","description":"Dans la lutte contre la fraude, le terrain de jeu change sans cesse. Les fraudeurs exploitent d\u00e9sormais l\u2019IA g\u00e9n\u00e9rative pour industrialiser le phishing, fabriquer des usurpations cr\u00e9dibles et automatiser des sc\u00e9narios d\u2019attaque. Le r\u00e9sultat : un jeu du chat et de la souris permanent, o\u00f9 la vitesse d\u2019adaptation fait la diff\u00e9rence. Chez Oneytrust, nous assumons une conviction simple : pour contrer des attaquants outill\u00e9s par l\u2019IA, il faut mieux utiliser l\u2019IA que les fraudeurs \u2014 sans sacrifier la fluidit\u00e9 des parcours clients ni la conformit\u00e9 r\u00e9glementaire.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.oneytrust.com\/fr\/merlin-network-anatomy-of-a-triangular-fraud-2\/","og_locale":"fr_FR","og_type":"article","og_title":"AI at Oneytrust: technology at the heart of our DNA!","og_description":"In the fight against fraud, the playing field is constantly changing. Fraudsters are now exploiting generative AI to industrialise phishing, create credible impersonations and automate attack scenarios. The result is a constant game of cat and mouse, where speed of adaptation makes all the difference. At Oneytrust, we have a simple belief: to counter AI-powered attackers, we must use AI better than fraudsters \u2014 without sacrificing customer experience or regulatory compliance.","og_url":"https:\/\/www.oneytrust.com\/fr\/merlin-network-anatomy-of-a-triangular-fraud-2\/","og_site_name":"Oneytrust","article_published_time":"2025-09-18T16:06:27+00:00","article_modified_time":"2025-09-18T16:06:28+00:00","og_image":[{"width":1200,"height":1200,"url":"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/09\/Etiquette_Linkedin_Fraude_Triangulaire.png","type":"image\/png"}],"author":"Julie Breton","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Julie Breton","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.oneytrust.com\/merlin-network-anatomy-of-a-triangular-fraud-2\/#article","isPartOf":{"@id":"https:\/\/www.oneytrust.com\/merlin-network-anatomy-of-a-triangular-fraud-2\/"},"author":{"name":"Julie Breton","@id":"https:\/\/www.oneytrust.com\/#\/schema\/person\/7468b32537747c2a80c28ba0064f7f4d"},"headline":"MERLIN network: anatomy of a triangular fraud","datePublished":"2025-09-18T16:06:27+00:00","dateModified":"2025-09-18T16:06:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.oneytrust.com\/merlin-network-anatomy-of-a-triangular-fraud-2\/"},"wordCount":590,"publisher":{"@id":"https:\/\/www.oneytrust.com\/#organization"},"image":{"@id":"https:\/\/www.oneytrust.com\/merlin-network-anatomy-of-a-triangular-fraud-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/09\/Etiquette_Linkedin_Fraude_Triangulaire.png","keywords":["ADN","ecommerce","FRAUDE","IA","luttecontrelafraude","s\u00e9curit\u00e9","technologie"],"articleSection":["Expertise","General"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.oneytrust.com\/merlin-network-anatomy-of-a-triangular-fraud-2\/","url":"https:\/\/www.oneytrust.com\/merlin-network-anatomy-of-a-triangular-fraud-2\/","name":"L\u2019IA chez Oneytrust : une technologie au coeur de notre ADN !","isPartOf":{"@id":"https:\/\/www.oneytrust.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.oneytrust.com\/merlin-network-anatomy-of-a-triangular-fraud-2\/#primaryimage"},"image":{"@id":"https:\/\/www.oneytrust.com\/merlin-network-anatomy-of-a-triangular-fraud-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/09\/Etiquette_Linkedin_Fraude_Triangulaire.png","datePublished":"2025-09-18T16:06:27+00:00","dateModified":"2025-09-18T16:06:28+00:00","description":"Dans la lutte contre la fraude, le terrain de jeu change sans cesse. Les fraudeurs exploitent d\u00e9sormais l\u2019IA g\u00e9n\u00e9rative pour industrialiser le phishing, fabriquer des usurpations cr\u00e9dibles et automatiser des sc\u00e9narios d\u2019attaque. Le r\u00e9sultat : un jeu du chat et de la souris permanent, o\u00f9 la vitesse d\u2019adaptation fait la diff\u00e9rence. Chez Oneytrust, nous assumons une conviction simple : pour contrer des attaquants outill\u00e9s par l\u2019IA, il faut mieux utiliser l\u2019IA que les fraudeurs \u2014 sans sacrifier la fluidit\u00e9 des parcours clients ni la conformit\u00e9 r\u00e9glementaire.","breadcrumb":{"@id":"https:\/\/www.oneytrust.com\/merlin-network-anatomy-of-a-triangular-fraud-2\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.oneytrust.com\/merlin-network-anatomy-of-a-triangular-fraud-2\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.oneytrust.com\/merlin-network-anatomy-of-a-triangular-fraud-2\/#primaryimage","url":"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/09\/Etiquette_Linkedin_Fraude_Triangulaire.png","contentUrl":"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/09\/Etiquette_Linkedin_Fraude_Triangulaire.png","width":1200,"height":1200},{"@type":"BreadcrumbList","@id":"https:\/\/www.oneytrust.com\/merlin-network-anatomy-of-a-triangular-fraud-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.oneytrust.com\/"},{"@type":"ListItem","position":2,"name":"MERLIN network: anatomy of a triangular fraud"}]},{"@type":"WebSite","@id":"https:\/\/www.oneytrust.com\/#website","url":"https:\/\/www.oneytrust.com\/","name":"Oneytrust","description":"Only Trusted Customers. Oneytrust provides fraud detection and identity validation for merchants and banks. Unique consortia data, unbeatable fraud scoring.","publisher":{"@id":"https:\/\/www.oneytrust.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.oneytrust.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.oneytrust.com\/#organization","name":"Oneytrust","url":"https:\/\/www.oneytrust.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.oneytrust.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/04\/oneytrust-logo.svg","contentUrl":"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/04\/oneytrust-logo.svg","width":171,"height":40,"caption":"Oneytrust"},"image":{"@id":"https:\/\/www.oneytrust.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.oneytrust.com\/#\/schema\/person\/7468b32537747c2a80c28ba0064f7f4d","name":"Julie Breton","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.oneytrust.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7d778d89a656901040a5cb3d84c274d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7d778d89a656901040a5cb3d84c274d6?s=96&d=mm&r=g","caption":"Julie Breton"},"url":"https:\/\/www.oneytrust.com\/fr\/author\/julie-breton\/"}]}},"taxonomy_info":{"category":[{"value":6,"label":"Expertise"},{"value":1,"label":"General"}],"post_tag":[{"value":45,"label":"ADN"},{"value":31,"label":"ecommerce"},{"value":37,"label":"FRAUDE"},{"value":32,"label":"IA"},{"value":26,"label":"luttecontrelafraude"},{"value":44,"label":"s\u00e9curit\u00e9"},{"value":46,"label":"technologie"}]},"featured_image_src_large":["https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/09\/Etiquette_Linkedin_Fraude_Triangulaire.png",1172,1172,false],"author_info":{"display_name":"Julie Breton","author_link":"https:\/\/www.oneytrust.com\/fr\/author\/julie-breton\/"},"comment_info":0,"category_info":[{"term_id":6,"name":"Expertise","slug":"expertise","term_group":0,"term_taxonomy_id":6,"taxonomy":"category","description":"","parent":0,"count":29,"filter":"raw","cat_ID":6,"category_count":29,"category_description":"","cat_name":"Expertise","category_nicename":"expertise","category_parent":0},{"term_id":1,"name":"General","slug":"general","term_group":0,"term_taxonomy_id":1,"taxonomy":"category","description":"","parent":0,"count":30,"filter":"raw","cat_ID":1,"category_count":30,"category_description":"","cat_name":"General","category_nicename":"general","category_parent":0}],"tag_info":[{"term_id":45,"name":"ADN","slug":"adn","term_group":0,"term_taxonomy_id":45,"taxonomy":"post_tag","description":"","parent":0,"count":4,"filter":"raw"},{"term_id":31,"name":"ecommerce","slug":"ecommerce","term_group":0,"term_taxonomy_id":31,"taxonomy":"post_tag","description":"","parent":0,"count":18,"filter":"raw"},{"term_id":37,"name":"FRAUDE","slug":"fraude","term_group":0,"term_taxonomy_id":37,"taxonomy":"post_tag","description":"","parent":0,"count":17,"filter":"raw"},{"term_id":32,"name":"IA","slug":"ia","term_group":0,"term_taxonomy_id":32,"taxonomy":"post_tag","description":"","parent":0,"count":8,"filter":"raw"},{"term_id":26,"name":"luttecontrelafraude","slug":"luttecontrelafraude","term_group":0,"term_taxonomy_id":26,"taxonomy":"post_tag","description":"","parent":0,"count":16,"filter":"raw"},{"term_id":44,"name":"s\u00e9curit\u00e9","slug":"securite","term_group":0,"term_taxonomy_id":44,"taxonomy":"post_tag","description":"","parent":0,"count":7,"filter":"raw"},{"term_id":46,"name":"technologie","slug":"technologie","term_group":0,"term_taxonomy_id":46,"taxonomy":"post_tag","description":"","parent":0,"count":6,"filter":"raw"}],"_links":{"self":[{"href":"https:\/\/www.oneytrust.com\/fr\/wp-json\/wp\/v2\/posts\/2454","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.oneytrust.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.oneytrust.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.oneytrust.com\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.oneytrust.com\/fr\/wp-json\/wp\/v2\/comments?post=2454"}],"version-history":[{"count":1,"href":"https:\/\/www.oneytrust.com\/fr\/wp-json\/wp\/v2\/posts\/2454\/revisions"}],"predecessor-version":[{"id":2456,"href":"https:\/\/www.oneytrust.com\/fr\/wp-json\/wp\/v2\/posts\/2454\/revisions\/2456"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.oneytrust.com\/fr\/wp-json\/wp\/v2\/media\/2455"}],"wp:attachment":[{"href":"https:\/\/www.oneytrust.com\/fr\/wp-json\/wp\/v2\/media?parent=2454"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.oneytrust.com\/fr\/wp-json\/wp\/v2\/categories?post=2454"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.oneytrust.com\/fr\/wp-json\/wp\/v2\/tags?post=2454"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}