{"id":22157,"date":"2023-10-12T06:19:54","date_gmt":"2023-10-12T04:19:54","guid":{"rendered":"https:\/\/news.save.ch\/?p=22157"},"modified":"2023-10-27T10:09:29","modified_gmt":"2023-10-27T08:09:29","slug":"verborgene-eindringlinge-im-e-mail-postfach","status":null,"type":"post","link":"https:\/\/news.save.ch\/en\/verborgene-eindringlinge-im-e-mail-postfach\/","title":{"rendered":"Hidden intruders in the email inbox"},"content":{"rendered":"<figure id=\"attachment_22158\" aria-describedby=\"caption-attachment-22158\" style=\"width: 680px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-22158\" src=\"https:\/\/news.save.ch\/wp-content\/uploads\/2023\/10\/Depositphotos_184420508_S-680x469.jpg\" alt=\"E-mail\" width=\"680\" height=\"469\" srcset=\"https:\/\/news.save.ch\/wp-content\/uploads\/2023\/10\/Depositphotos_184420508_S-680x469.jpg 680w, https:\/\/news.save.ch\/wp-content\/uploads\/2023\/10\/Depositphotos_184420508_S-768x530.jpg 768w, https:\/\/news.save.ch\/wp-content\/uploads\/2023\/10\/Depositphotos_184420508_S-18x12.jpg 18w, https:\/\/news.save.ch\/wp-content\/uploads\/2023\/10\/Depositphotos_184420508_S-375x259.jpg 375w, https:\/\/news.save.ch\/wp-content\/uploads\/2023\/10\/Depositphotos_184420508_S-507x350.jpg 507w, https:\/\/news.save.ch\/wp-content\/uploads\/2023\/10\/Depositphotos_184420508_S.jpg 1000w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><figcaption id=\"caption-attachment-22158\" class=\"wp-caption-text\">Depositphotos, perig76<\/figcaption><\/figure>\n<p>Even though email security has evolved and the use of machine learning has made it easier to detect suspicious inbox rule creations, attackers continue to use this technique successfully. Because it requires a compromised account, the overall numbers of this threat are probably low. Nevertheless, it poses a serious threat to the integrity of an organization's data and assets - not least because an attacker's rule creation is a post-compromise technique, meaning it is already on the network and requires immediate countermeasures.<br \/>\nBelow, we highlight how attackers abuse automated email rules and how organizations can effectively protect themselves.<\/p>\n<h3>Email is a primary attack vector<\/h3>\n<p>Email-based attacks have a high success rate and are a common entry point for many other cyberattacks. A study by Barracuda found that 75 percent of organizations surveyed globally have experienced at least one security breach via email in 2022. These attacks range from simple phishing attacks and malicious links or attachments to sophisticated social engineering techniques such as business email compromise (BEC), conversation hijacking and account takeover. Some of the most advanced types involve malicious email rules.<\/p>\n<h3>How attackers create automated email rules<\/h3>\n<p>To create malicious email rules, attackers must have compromised a target account, for example, through a successful phishing email or using stolen credentials captured in a previous intrusion. Once the attacker has gained control of the victim's email account, they can set up one or more automated email rules.<\/p>\n<h3>Email rules for information theft and camouflage<\/h3>\n<p>Attackers can set up a rule to forward all emails with sensitive and potentially lucrative keywords such as \"payment,\" \"invoice,\" or \"confidential\" to an external address. Furthermore, they can also abuse email rules to hide certain incoming emails by moving these messages to rarely used folders, marking emails as read or simply deleting them. For example, to hide security alerts, command-and-control messages, or responses to internal spear-phishing emails sent from the compromised account, or to cover their tracks from the account owner, who is likely using the account at the same time without knowing about the intruders. In addition, attackers can also abuse email forwarding rules to monitor a victim's activities and gather information about the victim or the victim's organization to use it for further attacks or operations.<\/p>\n<h3>Using email rules for BEC attacks<\/h3>\n<p>In business email compromise (BEC) attacks, cybercriminals try to convince their victims that an email is from a legitimate user in order to defraud the company and its employees, customers, or partners. For example, attackers can set up a rule that deletes all incoming emails from a specific employee or supervisor, such as the chief finance officer (CFO). In this way, criminals can impersonate the CFO and send fake emails to employees to convince them to transfer company funds to a bank account controlled by the attackers.<\/p>\n<p>In November 2020, the FBI published a story about how cybercriminals are exploiting the lack of synchronization and security transparency between web-based and desktop email clients to set email forwarding rules, increasing the likelihood of a successful BEC attack.<\/p>\n<h3>Use of email rules in targeted nation-state attacks<\/h3>\n<p>Malicious email rules are also used in targeted nation-state attacks. The Framework of Adversary Tactics and Techniques called MITRE ATT&amp;CK cites three APTs (Advanced Persistent Threat Groups) that use the malicious email forwarding technique (T1114.003). They are Kimsuky, a nation-state cyber espionage threat group, LAPSUS$, known for its extortion and disruption attacks, and Silent Librarian, another nation-state group associated with intellectual property theft and research.<\/p>\n<p>MITRE classifies email hiding rules (T1564.008) as a technique used to circumvent security defenses. One APT known to use this technique is FIN4, a financially motivated threat actor that creates rules in victims' accounts to automatically delete emails containing words such as \"hacked,\" \"phish,\" and \"malware,\" likely to prevent the victim's IT team from notifying employees and others of their activities.<\/p>\n<h3>Safety measures that do not work alone<\/h3>\n<p>If a malicious rule is not detected, it remains in effect even if the victim's password is changed, multi-level authentication is enabled, other strict conditional access policies are implemented, or the computer is completely rebuilt. As long as the rule remains in effect, it remains effective.<\/p>\n<p>Although suspicious email rules can be a good indication of an attack, looking at them in isolation is not a sufficient signal that an account has been compromised. Defenses must therefore use multiple signals to reduce irrelevant information and alert the security team to a likely successful email attack. The dynamic and evolving nature of cyberattacks, including the use of sophisticated tactics by attackers, requires a multi-layered approach to detection and defense.<\/p>\n<h3>Effective defense measures<\/h3>\n<p>Because inbox rule creation is a post-compromise technique, the most effective protection is prevention - preventing attackers from hijacking the account in the first place. However, organizations also need effective incident detection and response measures to identify accounts under attack and mitigate the impact of those attacks. This includes complete visibility into all actions taken on each employee's inbox and what rules are created, what was changed or accessed, the user's login history, the time, location and context of emails sent, and more. Advanced AI-based email security solutions use this data to create an intelligent account profile for each user, instantly flagging any anomaly, no matter how small. An identity theft protection feature also uses multiple signals such as credentials, email data, and statistical models along with rules to detect an account takeover attack.<\/p>\n<p>Finally, extended detection and response (XDR) and 24\/7 monitoring by a security operations center (SOC), can help detect and neutralize even deeply hidden and obfuscated activity. Abusing inbox rules is one of the most perfidious tactics used by cybercriminals. However, with the above measures, organizations can adequately defend against this threat to protect their sensitive data and assets.<\/p>\n<p><em><span style=\"font-size: 12.0pt; line-height: 106%; font-family: 'Arial',sans-serif;\">Author: Dr. Klaus Gheri, VP &amp; GM Network Security at <a href=\"http:\/\/www.barracuda.com\" target=\"_blank\" rel=\"noopener\">Barracuda<\/a> Networks<\/span><\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Auch wenn die E-Mail-Security sich weiterentwickelt und der Einsatz von maschinellem Lernen es einfacher gemacht hat, verd\u00e4chtige Posteingangsregel-Erstellungen zu erkennen, setzen Angreifer diese Technik weiterhin erfolgreich ein. Da hierf\u00fcr ein kompromittiertes Konto erforderlich ist, sind die Gesamtzahlen dieser Bedrohung vermutlich niedrig. Dennoch stellt sie eine ernsthafte Bedrohung f\u00fcr die Integrit\u00e4t der Daten und Verm\u00f6genswerte eines [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":22158,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[3313],"tags":[3682],"class_list":["post-22157","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalisierung","tag-hacker-angriff"],"acf":[],"hkrextid":null,"publication":null,"issue":null,"workflow":null,"startPage":null,"spitzmarke":null,"_posts_by_tag_page_fields":null,"_at_widget":null,"_yoast_wpseo_primary_category":"3313","_yoast_wpseo_focuskw_text_input":null,"_yoast_wpseo_opengraph-image":null,"_yoast_wpseo_opengraph-description":null,"_yoast_wpseo_opengraph-title":null,"enclosure":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"_wp_old_slug":null,"_yoast_wpseo_title":null,"_yoast_wpseo_canonical":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Verborgene Eindringlinge im E-Mail-Postfach - Save<\/title>\n<meta name=\"description\" content=\"Automatisierte Regeln f\u00fcr den E-Mail-Posteingang sind eine n\u00fctzliche und vertraute Funktion der meisten E-Mail-Programme. Aber aufgepasst!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.save.ch\/en\/verborgene-eindringlinge-im-e-mail-postfach\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Verborgene Eindringlinge im E-Mail-Postfach - Save\" \/>\n<meta property=\"og:description\" content=\"Automatisierte Regeln f\u00fcr den E-Mail-Posteingang sind eine n\u00fctzliche und vertraute Funktion der meisten E-Mail-Programme. Aber aufgepasst!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.save.ch\/en\/verborgene-eindringlinge-im-e-mail-postfach\/\" \/>\n<meta property=\"og:site_name\" content=\"Save\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-12T04:19:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-27T08:09:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.save.ch\/wp-content\/uploads\/2023\/10\/Depositphotos_184420508_S.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"690\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roger Str\u00e4ssle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Str\u00e4ssle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/verborgene-eindringlinge-im-e-mail-postfach\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/verborgene-eindringlinge-im-e-mail-postfach\\\/\"},\"author\":{\"name\":\"Roger Str\u00e4ssle\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\"},\"headline\":\"Verborgene Eindringlinge im E-Mail-Postfach\",\"datePublished\":\"2023-10-12T04:19:54+00:00\",\"dateModified\":\"2023-10-27T08:09:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/verborgene-eindringlinge-im-e-mail-postfach\\\/\"},\"wordCount\":1084,\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/verborgene-eindringlinge-im-e-mail-postfach\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Depositphotos_184420508_S.jpg\",\"keywords\":[\"Hacker-Angriff\"],\"articleSection\":[\"DIGITALISIERUNG\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/verborgene-eindringlinge-im-e-mail-postfach\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/verborgene-eindringlinge-im-e-mail-postfach\\\/\",\"name\":\"Verborgene Eindringlinge im E-Mail-Postfach - Save\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/verborgene-eindringlinge-im-e-mail-postfach\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/verborgene-eindringlinge-im-e-mail-postfach\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Depositphotos_184420508_S.jpg\",\"datePublished\":\"2023-10-12T04:19:54+00:00\",\"dateModified\":\"2023-10-27T08:09:29+00:00\",\"description\":\"Automatisierte Regeln f\u00fcr den E-Mail-Posteingang sind eine n\u00fctzliche und vertraute Funktion der meisten E-Mail-Programme. Aber aufgepasst!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/verborgene-eindringlinge-im-e-mail-postfach\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/news.save.ch\\\/verborgene-eindringlinge-im-e-mail-postfach\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/verborgene-eindringlinge-im-e-mail-postfach\\\/#primaryimage\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Depositphotos_184420508_S.jpg\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Depositphotos_184420508_S.jpg\",\"width\":1000,\"height\":690,\"caption\":\"Depositphotos, perig76\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/verborgene-eindringlinge-im-e-mail-postfach\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Verborgene Eindringlinge im E-Mail-Postfach\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"name\":\"Save\",\"description\":\"Schweizer Fachzeitschrift f\u00fcr Sicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/news.save.ch\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\",\"name\":\"Sicherheitsforum\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"width\":1100,\"height\":91,\"caption\":\"Sicherheitsforum\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\",\"name\":\"Roger Str\u00e4ssle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"caption\":\"Roger Str\u00e4ssle\"},\"url\":\"https:\\\/\\\/news.save.ch\\\/en\\\/author\\\/roger-straessle\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hidden intruders in the email inbox - Save","description":"Automated email inbox rules are a useful and familiar feature of most email clients. But watch out!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.save.ch\/en\/verborgene-eindringlinge-im-e-mail-postfach\/","og_locale":"en_US","og_type":"article","og_title":"Verborgene Eindringlinge im E-Mail-Postfach - Save","og_description":"Automatisierte Regeln f\u00fcr den E-Mail-Posteingang sind eine n\u00fctzliche und vertraute Funktion der meisten E-Mail-Programme. Aber aufgepasst!","og_url":"https:\/\/news.save.ch\/en\/verborgene-eindringlinge-im-e-mail-postfach\/","og_site_name":"Save","article_published_time":"2023-10-12T04:19:54+00:00","article_modified_time":"2023-10-27T08:09:29+00:00","og_image":[{"width":1000,"height":690,"url":"https:\/\/news.save.ch\/wp-content\/uploads\/2023\/10\/Depositphotos_184420508_S.jpg","type":"image\/jpeg"}],"author":"Roger Str\u00e4ssle","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Roger Str\u00e4ssle","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.save.ch\/verborgene-eindringlinge-im-e-mail-postfach\/#article","isPartOf":{"@id":"https:\/\/news.save.ch\/verborgene-eindringlinge-im-e-mail-postfach\/"},"author":{"name":"Roger Str\u00e4ssle","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa"},"headline":"Verborgene Eindringlinge im E-Mail-Postfach","datePublished":"2023-10-12T04:19:54+00:00","dateModified":"2023-10-27T08:09:29+00:00","mainEntityOfPage":{"@id":"https:\/\/news.save.ch\/verborgene-eindringlinge-im-e-mail-postfach\/"},"wordCount":1084,"publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"image":{"@id":"https:\/\/news.save.ch\/verborgene-eindringlinge-im-e-mail-postfach\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2023\/10\/Depositphotos_184420508_S.jpg","keywords":["Hacker-Angriff"],"articleSection":["DIGITALISIERUNG"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/news.save.ch\/verborgene-eindringlinge-im-e-mail-postfach\/","url":"https:\/\/news.save.ch\/verborgene-eindringlinge-im-e-mail-postfach\/","name":"Hidden intruders in the email inbox - Save","isPartOf":{"@id":"https:\/\/news.save.ch\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.save.ch\/verborgene-eindringlinge-im-e-mail-postfach\/#primaryimage"},"image":{"@id":"https:\/\/news.save.ch\/verborgene-eindringlinge-im-e-mail-postfach\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2023\/10\/Depositphotos_184420508_S.jpg","datePublished":"2023-10-12T04:19:54+00:00","dateModified":"2023-10-27T08:09:29+00:00","description":"Automated email inbox rules are a useful and familiar feature of most email clients. But watch out!","breadcrumb":{"@id":"https:\/\/news.save.ch\/verborgene-eindringlinge-im-e-mail-postfach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.save.ch\/verborgene-eindringlinge-im-e-mail-postfach\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/news.save.ch\/verborgene-eindringlinge-im-e-mail-postfach\/#primaryimage","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2023\/10\/Depositphotos_184420508_S.jpg","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2023\/10\/Depositphotos_184420508_S.jpg","width":1000,"height":690,"caption":"Depositphotos, perig76"},{"@type":"BreadcrumbList","@id":"https:\/\/news.save.ch\/verborgene-eindringlinge-im-e-mail-postfach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.save.ch\/de\/"},{"@type":"ListItem","position":2,"name":"Verborgene Eindringlinge im E-Mail-Postfach"}]},{"@type":"WebSite","@id":"https:\/\/news.save.ch\/de\/#website","url":"https:\/\/news.save.ch\/de\/","name":"Save","description":"Swiss trade journal for safety","publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.save.ch\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/news.save.ch\/de\/#organization","name":"Security Forum","url":"https:\/\/news.save.ch\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","width":1100,"height":91,"caption":"Sicherheitsforum"},"image":{"@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa","name":"Roger Str\u00e4ssle","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","caption":"Roger Str\u00e4ssle"},"url":"https:\/\/news.save.ch\/en\/author\/roger-straessle\/"}]}},"_links":{"self":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/22157","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/comments?post=22157"}],"version-history":[{"count":4,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/22157\/revisions"}],"predecessor-version":[{"id":22171,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/22157\/revisions\/22171"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/media\/22158"}],"wp:attachment":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/media?parent=22157"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/categories?post=22157"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/tags?post=22157"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}