{"id":5291,"date":"2017-09-07T06:14:44","date_gmt":"2017-09-07T04:14:44","guid":{"rendered":"https:\/\/news.save.ch\/?p=5291"},"modified":"2023-03-14T08:57:01","modified_gmt":"2023-03-14T07:57:01","slug":"sechs-hacker-methoden","status":null,"type":"post","link":"https:\/\/news.save.ch\/en\/sechs-hacker-methoden\/","title":{"rendered":"Six common hacking methods"},"content":{"rendered":"<figure id=\"attachment_5292\" aria-describedby=\"caption-attachment-5292\" style=\"width: 500px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5292 size-full\" src=\"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/08\/Depositphotos_96928212_s-2015.jpg\" alt=\" the six most common hacking methods\" width=\"500\" height=\"333\" srcset=\"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/08\/Depositphotos_96928212_s-2015.jpg 500w, https:\/\/news.save.ch\/wp-content\/uploads\/2017\/08\/Depositphotos_96928212_s-2015-375x250.jpg 375w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><figcaption id=\"caption-attachment-5292\" class=\"wp-caption-text\">\u00a9 depositphotos<\/figcaption><\/figure>\n<p>Hackers are doing everything they can to gain possession of IT credentials for privileged user accounts. <a href=\"https:\/\/www.cyberark.com\/\">CyberArk<\/a> explains the six most common methods they use to do this:<\/p>\n<p><strong><em>Keystroke Logging:<\/em> <\/strong>In this case, a user's keystrokes are logged with the help of injected malware. A keylogger can either record all data or wait for specific entries.<\/p>\n<p><strong><em>Brute force attacks:<\/em> <\/strong>In this method, hackers try to guess passwords by simply trying all possible combinations with the support of special software. The shorter and simpler the passwords are, and the less frequently they are changed, the higher the probability of success.<\/p>\n<p><strong><em>Memory Scraping:<\/em> <\/strong>A malware taps into the RAM of PCs and searches for access data there. This can be passwords stored in plain text or hashes in Windows environments that can be used for pass-the-hash attacks.<\/p>\n<p><strong><em>Password spreadsheets:<\/em><\/strong> Many companies still keep their passwords in central tables. This makes them a particularly lucrative target for cyber criminals.<\/p>\n<p><strong><em>Social Engineering:<\/em> <\/strong>In this case, hackers pretend to be acquaintances or colleagues, for example in e-mails. In this way, they try to persuade their victims to voluntarily disclose their access data.<\/p>\n<p><strong><em>Hard-coded credentials:<\/em> <\/strong>Cyber criminals also often look for passwords or SSH keys that are found in the programming codes of applications, in scripts or in configuration files. They enable far-reaching access, but are often not changed for years.<\/p>\n<p>\"Most companies are now aware that privileged credentials play the crucial role in cyber attacks. Yet they are often not adequately protected,\" says Michael Kleist, Regional Director DACH at CyberArk.<\/p>\n<p>In the expert's experience, many companies keep their passwords in spreadsheets, change their access data far too infrequently, or often grant users full administrative rights on PCs and servers unnecessarily. Moreover, conventional IT security measures are often powerless against modern cyber attacks. The intrusion of malware, which serves to spy on access data, can often not be prevented by perimeter protection.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Hacker setzen alles daran, in den Besitz der IT-Zugangsdaten f\u00fcr privilegierte Benutzerkonten zu gelangen. CyberArk erl\u00e4utert die sechs h\u00e4ufigsten Methoden, die sie dabei anwenden: Keystroke Logging: Hierbei werden mit Hilfe einer eingeschleusten Schadsoftware die Eingaben eines Benutzers an der Tastatur protokolliert. Ein Keylogger kann entweder s\u00e4mtliche Daten aufzeichnen oder gezielt auf bestimmte Eingaben warten. Brute-Force-Attacken: [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":5292,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[3313],"tags":[96,63],"class_list":["post-5291","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalisierung","tag-cyber-crime","tag-it-security"],"acf":[],"hkrextid":null,"publication":null,"issue":null,"workflow":null,"startPage":null,"spitzmarke":null,"_posts_by_tag_page_fields":{"widget_title":"","widget_tags":""},"_at_widget":"1","_yoast_wpseo_primary_category":"2","_yoast_wpseo_focuskw_text_input":"Hacker-Methoden","_yoast_wpseo_opengraph-image":null,"_yoast_wpseo_opengraph-description":null,"_yoast_wpseo_opengraph-title":null,"enclosure":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"_wp_old_slug":null,"_yoast_wpseo_title":null,"_yoast_wpseo_canonical":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Sechs h\u00e4ufige Hacker-Methoden - Save<\/title>\n<meta name=\"description\" content=\"Hacker setzen alles daran, in den Besitz der IT-Zugangsdaten f\u00fcr privilegierte Benutzerkonten zu gelangen. Die sechs h\u00e4ufigsten Methoden.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.save.ch\/en\/sechs-hacker-methoden\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sechs h\u00e4ufige Hacker-Methoden - Save\" \/>\n<meta property=\"og:description\" content=\"Hacker setzen alles daran, in den Besitz der IT-Zugangsdaten f\u00fcr privilegierte Benutzerkonten zu gelangen. Die sechs h\u00e4ufigsten Methoden.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.save.ch\/en\/sechs-hacker-methoden\/\" \/>\n<meta property=\"og:site_name\" content=\"Save\" \/>\n<meta property=\"article:published_time\" content=\"2017-09-07T04:14:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-14T07:57:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/08\/Depositphotos_96928212_s-2015.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"333\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roger Str\u00e4ssle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Str\u00e4ssle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-hacker-methoden\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-hacker-methoden\\\/\"},\"author\":{\"name\":\"Roger Str\u00e4ssle\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\"},\"headline\":\"Sechs h\u00e4ufige Hacker-Methoden\",\"datePublished\":\"2017-09-07T04:14:44+00:00\",\"dateModified\":\"2023-03-14T07:57:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-hacker-methoden\\\/\"},\"wordCount\":347,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-hacker-methoden\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/Depositphotos_96928212_s-2015.jpg\",\"keywords\":[\"Cyber-Crime\",\"IT-SECURITY\"],\"articleSection\":[\"DIGITALISIERUNG\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-hacker-methoden\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/sechs-hacker-methoden\\\/\",\"name\":\"Sechs h\u00e4ufige Hacker-Methoden - Save\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-hacker-methoden\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-hacker-methoden\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/Depositphotos_96928212_s-2015.jpg\",\"datePublished\":\"2017-09-07T04:14:44+00:00\",\"dateModified\":\"2023-03-14T07:57:01+00:00\",\"description\":\"Hacker setzen alles daran, in den Besitz der IT-Zugangsdaten f\u00fcr privilegierte Benutzerkonten zu gelangen. Die sechs h\u00e4ufigsten Methoden.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-hacker-methoden\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/news.save.ch\\\/sechs-hacker-methoden\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-hacker-methoden\\\/#primaryimage\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/Depositphotos_96928212_s-2015.jpg\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/Depositphotos_96928212_s-2015.jpg\",\"width\":500,\"height\":333,\"caption\":\"\u00a9 depositphotos\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/sechs-hacker-methoden\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sechs h\u00e4ufige Hacker-Methoden\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"name\":\"Save\",\"description\":\"Schweizer Fachzeitschrift f\u00fcr Sicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/news.save.ch\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\",\"name\":\"Sicherheitsforum\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"width\":1100,\"height\":91,\"caption\":\"Sicherheitsforum\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\",\"name\":\"Roger Str\u00e4ssle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"caption\":\"Roger Str\u00e4ssle\"},\"url\":\"https:\\\/\\\/news.save.ch\\\/en\\\/author\\\/roger-straessle\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Six common hacking methods - Save","description":"Hackers will do anything to get their hands on IT credentials for privileged user accounts. The six most common methods.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.save.ch\/en\/sechs-hacker-methoden\/","og_locale":"en_US","og_type":"article","og_title":"Sechs h\u00e4ufige Hacker-Methoden - Save","og_description":"Hacker setzen alles daran, in den Besitz der IT-Zugangsdaten f\u00fcr privilegierte Benutzerkonten zu gelangen. Die sechs h\u00e4ufigsten Methoden.","og_url":"https:\/\/news.save.ch\/en\/sechs-hacker-methoden\/","og_site_name":"Save","article_published_time":"2017-09-07T04:14:44+00:00","article_modified_time":"2023-03-14T07:57:01+00:00","og_image":[{"width":500,"height":333,"url":"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/08\/Depositphotos_96928212_s-2015.jpg","type":"image\/jpeg"}],"author":"Roger Str\u00e4ssle","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Roger Str\u00e4ssle","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.save.ch\/sechs-hacker-methoden\/#article","isPartOf":{"@id":"https:\/\/news.save.ch\/sechs-hacker-methoden\/"},"author":{"name":"Roger Str\u00e4ssle","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa"},"headline":"Sechs h\u00e4ufige Hacker-Methoden","datePublished":"2017-09-07T04:14:44+00:00","dateModified":"2023-03-14T07:57:01+00:00","mainEntityOfPage":{"@id":"https:\/\/news.save.ch\/sechs-hacker-methoden\/"},"wordCount":347,"commentCount":0,"publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"image":{"@id":"https:\/\/news.save.ch\/sechs-hacker-methoden\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/08\/Depositphotos_96928212_s-2015.jpg","keywords":["Cyber-Crime","IT-SECURITY"],"articleSection":["DIGITALISIERUNG"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/news.save.ch\/sechs-hacker-methoden\/","url":"https:\/\/news.save.ch\/sechs-hacker-methoden\/","name":"Six common hacking methods - Save","isPartOf":{"@id":"https:\/\/news.save.ch\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.save.ch\/sechs-hacker-methoden\/#primaryimage"},"image":{"@id":"https:\/\/news.save.ch\/sechs-hacker-methoden\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/08\/Depositphotos_96928212_s-2015.jpg","datePublished":"2017-09-07T04:14:44+00:00","dateModified":"2023-03-14T07:57:01+00:00","description":"Hackers will do anything to get their hands on IT credentials for privileged user accounts. The six most common methods.","breadcrumb":{"@id":"https:\/\/news.save.ch\/sechs-hacker-methoden\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.save.ch\/sechs-hacker-methoden\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/news.save.ch\/sechs-hacker-methoden\/#primaryimage","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/08\/Depositphotos_96928212_s-2015.jpg","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/08\/Depositphotos_96928212_s-2015.jpg","width":500,"height":333,"caption":"\u00a9 depositphotos"},{"@type":"BreadcrumbList","@id":"https:\/\/news.save.ch\/sechs-hacker-methoden\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.save.ch\/de\/"},{"@type":"ListItem","position":2,"name":"Sechs h\u00e4ufige Hacker-Methoden"}]},{"@type":"WebSite","@id":"https:\/\/news.save.ch\/de\/#website","url":"https:\/\/news.save.ch\/de\/","name":"Save","description":"Swiss trade journal for safety","publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.save.ch\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/news.save.ch\/de\/#organization","name":"Security Forum","url":"https:\/\/news.save.ch\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","width":1100,"height":91,"caption":"Sicherheitsforum"},"image":{"@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa","name":"Roger Str\u00e4ssle","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","caption":"Roger Str\u00e4ssle"},"url":"https:\/\/news.save.ch\/en\/author\/roger-straessle\/"}]}},"_links":{"self":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/5291","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/comments?post=5291"}],"version-history":[{"count":1,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/5291\/revisions"}],"predecessor-version":[{"id":17490,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/5291\/revisions\/17490"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/media\/5292"}],"wp:attachment":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/media?parent=5291"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/categories?post=5291"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/tags?post=5291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}