{"id":228827,"date":"2025-01-30T15:45:07","date_gmt":"2025-01-30T14:45:07","guid":{"rendered":"https:\/\/www.intrinsec.com\/?p=228827"},"modified":"2026-01-09T14:39:46","modified_gmt":"2026-01-09T14:39:46","slug":"telegram-stories-spoofers-vocaux-outils-et-modes-operatoires","status":"publish","type":"post","link":"https:\/\/www.intrinsec.com\/en\/telegram-stories-spoofers-vocaux-outils-et-modes-operatoires\/","title":{"rendered":"Telegram Stories: Voice spoofers, tools and methods"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"228827\" class=\"elementor elementor-228827\" data-elementor-settings=\"{&quot;element_pack_global_tooltip_width&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;element_pack_global_tooltip_width_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;element_pack_global_tooltip_width_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;element_pack_global_tooltip_padding&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_padding_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_padding_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_border_radius&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_border_radius_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_border_radius_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true}}\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-697b5380 e-flex e-con-boxed e-con e-parent\" data-id=\"697b5380\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-39907626 elementor-widget elementor-widget-text-editor\" data-id=\"39907626\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4>Main conclusion<\/h4>\n<ul>\n<li>\n<p>Spoofers are primarily infrastructure providers. They develop the tool and then prepare paid &quot;slots&quot; for other users.<\/p>\n<\/li>\n<li>\n<p>They enjoy a dominant position mainly due to the difference in technical knowledge between fraudsters, who do not all know how to develop the infrastructure necessary to change a phone number during calls.<\/p>\n<\/li>\n<li>\n<p>Spoofers rely on tools already existing on the legal or open source market, which they repurpose by creating a parallel market.<\/p>\n<\/li>\n<li>The technical &quot;loophole&quot; allowing one to change their number comes from the SIP protocol which allows for the management of call details at a certain level, and from the interconnection between &quot;new&quot; and &quot;old&quot; networks which complicates the control imposed by operators.<\/li>\n<\/ul>\n<h4>Introduction<\/h4>\n<p style=\"text-align: justify;\"><span class=\"fontstyle0\">Our CTI Analyst Adrien observed that several individuals, using accounts as cover, <\/span><span class=\"fontstyle2\">Telegram<\/span><span class=\"fontstyle0\">, They claim to use, develop and rent services that allow them to spoof phone numbers, which they call <\/span><span class=\"fontstyle2\">Spoofers<\/span><span class=\"fontstyle0\">. It is thanks to these individuals that the &quot;\u00ab\u00a0<\/span><span class=\"fontstyle3\">alloters<\/span><span class=\"fontstyle0\">\u00ab&quot;Those posing as bank advisors can call from a perfectly legitimate number. Mentioned in various articles on the subject, these callers have already been analyzed several times.&quot;. <\/span><span class=\"fontstyle0\">For example, the YouTuber Micode published a video on May 30, 2023 illustrating his immersion in this environment, where we observe the codes and behaviors of these individuals. <\/span><span class=\"fontstyle0\">The Dark Web environment and this type of attack evoke a nebulous entity: vague, constantly changing, with multiple actors using various pseudonyms and dedicated jargon; it is difficult to establish a general and fixed portrait, given the wide variety of techniques and actors involved.<\/span><\/p>\n<h4>Intrinsec&#039;s CTI Services<\/h4>\n<p style=\"text-align: justify;\">Organizations are facing increasingly sophisticated threat actors and intrusion attempts. To counter these constantly evolving threats, a proactive approach to detecting and analyzing any potentially malicious activity is now essential. This practical approach allows companies to anticipate, or at least react as quickly as possible to, the breaches they encounter.<\/p>\n<p style=\"text-align: justify;\">For this report, Intrinsec relied on its Cyber Threat Intelligence service, which provides clients with high-value, contextualized, and actionable intelligence to understand and contain cyber threats. Our CTI team consolidates data and information gathered from our security monitoring services (SOC, MDR, etc.), our incident response team (CERT-Intrinsec), and customized cyber intelligence generated by our analysts using bespoke heuristics, honeypots, hunting, reverse engineering, and pivots.<\/p>\n<p style=\"text-align: justify;\">Intrinsec also offers various services related to Cyber Threat Intelligence:<\/p>\n<ul style=\"text-align: justify;\">\n<li>Risk anticipation: which can be leveraged to continuously adapt the detection and response capabilities of our clients&#039; existing tools (EDR, XDR, SIEM, etc.) through:\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>an operational flow of IOCs based on our exclusive activities.<\/strong><\/li>\n<li><strong>Threat intelligence notes and reports compliant with TIP standards.<\/strong><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>Digital risk monitoring:\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Data leak detection and remediation.<\/strong><\/li>\n<li><strong>external asset security monitoring (EASM).<\/strong><\/li>\n<li><strong>brand protection.<\/strong><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">Follow us on <a href=\"https:\/\/www.linkedin.com\/company\/intrinsec\/\">LinkedIn<\/a> And <a href=\"https:\/\/twitter.com\/Intrinsec\">X<\/a><\/p>\n\n\n<p><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9d4b4c6 elementor-widget elementor-widget-button\" data-id=\"9d4b4c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.intrinsec.com\/en\/spoofers-vocaux-outils-et-modes-operatoires-3-1\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Access the analysis<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Main conclusion: Spoofers are primarily infrastructure providers. They develop the tool and then prepare [\u2026]<\/p>","protected":false},"author":53,"featured_media":229512,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9,11],"tags":[],"class_list":["post-228827","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-threat-intelligence","category-threat-intelligence-report"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Telegram Stories: spoofers vocaux, outils et modes operatoires - INTRINSEC<\/title>\n<meta name=\"description\" content=\"Les Spoofers sont principalement des loueurs d\u2019infrastructures. d\u00e9couvrez ces nouveaux modes op\u00e9ratoires sophistiqu\u00e9s dans cette analyse..\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intrinsec.com\/en\/telegram-stories-spoofers-vocaux-outils-et-modes-operatoires\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Telegram Stories: spoofers vocaux, outils et modes operatoires\" \/>\n<meta property=\"og:description\" content=\"Les Spoofers sont principalement des loueurs d\u2019infrastructures. d\u00e9couvrez ces nouveaux modes op\u00e9ratoires sophistiqu\u00e9s dans cette analyse..\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intrinsec.com\/en\/telegram-stories-spoofers-vocaux-outils-et-modes-operatoires\/\" \/>\n<meta property=\"og:site_name\" content=\"INTRINSEC\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-30T14:45:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-09T14:39:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2025\/01\/Template-banner-webesite-7.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Adrien ALTOUNIAN\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adrien ALTOUNIAN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/telegram-stories-spoofers-vocaux-outils-et-modes-operatoires\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/telegram-stories-spoofers-vocaux-outils-et-modes-operatoires\\\/\"},\"author\":{\"name\":\"Adrien ALTOUNIAN\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/1e91418f194a027629feb7bf7a233a7d\"},\"headline\":\"Telegram Stories: spoofers vocaux, outils et modes operatoires\",\"datePublished\":\"2025-01-30T14:45:07+00:00\",\"dateModified\":\"2026-01-09T14:39:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/telegram-stories-spoofers-vocaux-outils-et-modes-operatoires\\\/\"},\"wordCount\":594,\"image\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/telegram-stories-spoofers-vocaux-outils-et-modes-operatoires\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.intrinsec.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Template-banner-webesite-7.png\",\"articleSection\":[\"Cyber Threat Intelligence\",\"Threat Intelligence Report\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/telegram-stories-spoofers-vocaux-outils-et-modes-operatoires\\\/\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/telegram-stories-spoofers-vocaux-outils-et-modes-operatoires\\\/\",\"name\":\"Telegram Stories: spoofers vocaux, outils et modes operatoires - INTRINSEC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/telegram-stories-spoofers-vocaux-outils-et-modes-operatoires\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/telegram-stories-spoofers-vocaux-outils-et-modes-operatoires\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.intrinsec.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Template-banner-webesite-7.png\",\"datePublished\":\"2025-01-30T14:45:07+00:00\",\"dateModified\":\"2026-01-09T14:39:46+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/1e91418f194a027629feb7bf7a233a7d\"},\"description\":\"Les Spoofers sont principalement des loueurs d\u2019infrastructures. d\u00e9couvrez ces nouveaux modes op\u00e9ratoires sophistiqu\u00e9s dans cette analyse..\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/telegram-stories-spoofers-vocaux-outils-et-modes-operatoires\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.intrinsec.com\\\/telegram-stories-spoofers-vocaux-outils-et-modes-operatoires\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/telegram-stories-spoofers-vocaux-outils-et-modes-operatoires\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Template-banner-webesite-7.png\",\"contentUrl\":\"https:\\\/\\\/www.intrinsec.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Template-banner-webesite-7.png\",\"width\":1200,\"height\":600,\"caption\":\"Telegram stories Spoofers\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/telegram-stories-spoofers-vocaux-outils-et-modes-operatoires\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.intrinsec.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Telegram Stories: spoofers vocaux, outils et modes operatoires\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#website\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/\",\"name\":\"INTRINSEC\",\"description\":\"Notre m\u00e9tier , Prot\u00e9ger le v\u00f4tre\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.intrinsec.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/1e91418f194a027629feb7bf7a233a7d\",\"name\":\"Adrien ALTOUNIAN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ddd4a579af0df208ffa1e8df4001e1ae1d485c233ffd767c7ce0e34686545eae?s=96&d=retro&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ddd4a579af0df208ffa1e8df4001e1ae1d485c233ffd767c7ce0e34686545eae?s=96&d=retro&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ddd4a579af0df208ffa1e8df4001e1ae1d485c233ffd767c7ce0e34686545eae?s=96&d=retro&r=g\",\"caption\":\"Adrien ALTOUNIAN\"},\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/en\\\/author\\\/adrien-altounian\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Telegram Stories: Voice Spoofers, Tools and Methods - INTRINSEC","description":"Spoofers are primarily infrastructure lessors. Discover these sophisticated new operating methods in this analysis.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intrinsec.com\/en\/telegram-stories-spoofers-vocaux-outils-et-modes-operatoires\/","og_locale":"en_US","og_type":"article","og_title":"Telegram Stories: spoofers vocaux, outils et modes operatoires","og_description":"Les Spoofers sont principalement des loueurs d\u2019infrastructures. d\u00e9couvrez ces nouveaux modes op\u00e9ratoires sophistiqu\u00e9s dans cette analyse..","og_url":"https:\/\/www.intrinsec.com\/en\/telegram-stories-spoofers-vocaux-outils-et-modes-operatoires\/","og_site_name":"INTRINSEC","article_published_time":"2025-01-30T14:45:07+00:00","article_modified_time":"2026-01-09T14:39:46+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2025\/01\/Template-banner-webesite-7.png","type":"image\/png"}],"author":"Adrien ALTOUNIAN","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Adrien ALTOUNIAN","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.intrinsec.com\/telegram-stories-spoofers-vocaux-outils-et-modes-operatoires\/#article","isPartOf":{"@id":"https:\/\/www.intrinsec.com\/telegram-stories-spoofers-vocaux-outils-et-modes-operatoires\/"},"author":{"name":"Adrien ALTOUNIAN","@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/1e91418f194a027629feb7bf7a233a7d"},"headline":"Telegram Stories: spoofers vocaux, outils et modes operatoires","datePublished":"2025-01-30T14:45:07+00:00","dateModified":"2026-01-09T14:39:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intrinsec.com\/telegram-stories-spoofers-vocaux-outils-et-modes-operatoires\/"},"wordCount":594,"image":{"@id":"https:\/\/www.intrinsec.com\/telegram-stories-spoofers-vocaux-outils-et-modes-operatoires\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2025\/01\/Template-banner-webesite-7.png","articleSection":["Cyber Threat Intelligence","Threat Intelligence Report"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.intrinsec.com\/telegram-stories-spoofers-vocaux-outils-et-modes-operatoires\/","url":"https:\/\/www.intrinsec.com\/telegram-stories-spoofers-vocaux-outils-et-modes-operatoires\/","name":"Telegram Stories: Voice Spoofers, Tools and Methods - INTRINSEC","isPartOf":{"@id":"https:\/\/www.intrinsec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intrinsec.com\/telegram-stories-spoofers-vocaux-outils-et-modes-operatoires\/#primaryimage"},"image":{"@id":"https:\/\/www.intrinsec.com\/telegram-stories-spoofers-vocaux-outils-et-modes-operatoires\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2025\/01\/Template-banner-webesite-7.png","datePublished":"2025-01-30T14:45:07+00:00","dateModified":"2026-01-09T14:39:46+00:00","author":{"@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/1e91418f194a027629feb7bf7a233a7d"},"description":"Spoofers are primarily infrastructure lessors. Discover these sophisticated new operating methods in this analysis.","breadcrumb":{"@id":"https:\/\/www.intrinsec.com\/telegram-stories-spoofers-vocaux-outils-et-modes-operatoires\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intrinsec.com\/telegram-stories-spoofers-vocaux-outils-et-modes-operatoires\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.intrinsec.com\/telegram-stories-spoofers-vocaux-outils-et-modes-operatoires\/#primaryimage","url":"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2025\/01\/Template-banner-webesite-7.png","contentUrl":"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2025\/01\/Template-banner-webesite-7.png","width":1200,"height":600,"caption":"Telegram stories Spoofers"},{"@type":"BreadcrumbList","@id":"https:\/\/www.intrinsec.com\/telegram-stories-spoofers-vocaux-outils-et-modes-operatoires\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.intrinsec.com\/"},{"@type":"ListItem","position":2,"name":"Telegram Stories: spoofers vocaux, outils et modes operatoires"}]},{"@type":"WebSite","@id":"https:\/\/www.intrinsec.com\/#website","url":"https:\/\/www.intrinsec.com\/","name":"INTRINSEC","description":"Our job is to protect yours.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intrinsec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/1e91418f194a027629feb7bf7a233a7d","name":"Adrien ALTOUNIAN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ddd4a579af0df208ffa1e8df4001e1ae1d485c233ffd767c7ce0e34686545eae?s=96&d=retro&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ddd4a579af0df208ffa1e8df4001e1ae1d485c233ffd767c7ce0e34686545eae?s=96&d=retro&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ddd4a579af0df208ffa1e8df4001e1ae1d485c233ffd767c7ce0e34686545eae?s=96&d=retro&r=g","caption":"Adrien ALTOUNIAN"},"url":"https:\/\/www.intrinsec.com\/en\/author\/adrien-altounian\/"}]}},"_links":{"self":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/228827","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/users\/53"}],"replies":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/comments?post=228827"}],"version-history":[{"count":5,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/228827\/revisions"}],"predecessor-version":[{"id":230218,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/228827\/revisions\/230218"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/media\/229512"}],"wp:attachment":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/media?parent=228827"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/categories?post=228827"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/tags?post=228827"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}