{"id":1445,"date":"2023-05-28T06:43:24","date_gmt":"2023-05-28T06:43:24","guid":{"rendered":"https:\/\/guide.trustvalley.swiss\/chapter\/infiltration\/"},"modified":"2023-05-31T08:24:19","modified_gmt":"2023-05-31T08:24:19","slug":"infiltration","status":"publish","type":"chapter","link":"https:\/\/guide.trustvalley.swiss\/de\/chapter\/infiltration\/","title":{"rendered":"Infiltration"},"content":{"rendered":"\n<p>Durch Versendung von Phishing-E-Mails und\/oder sch\u00e4dlichen Social-Media-Nachrichten bringen die Angreifenden eine Nutzerin oder einen Nutzer dazu, eine Schadsoftware auszuf\u00fchren, durch die ihr oder sein Rechner kompromittiert oder Unbefugten Zugriff auf das Netzwerk verschafft wird.<\/p>\n\n<p><strong>Zeitliche Dauer<\/strong><\/p>\n\n<p>Stunden\u2013Tage<\/p>\n\n<p><strong>Verwendete Taktiken<\/strong><\/p>\n\n<ul class=\"wp-block-list\">\n<li>Gezielte Phishing-E-Mails<\/li>\n\n\n\n<li>Social Engineering<\/li>\n<\/ul>\n\n<p><\/p>\n","protected":false},"featured_media":0,"template":"","categories":[],"searchablecategory":[],"class_list":["post-1445","chapter","type-chapter","status-publish","hentry"],"taxonomy_info":[],"featured_image_src_large":false,"author_info":[],"comment_info":"","_links":{"self":[{"href":"https:\/\/guide.trustvalley.swiss\/de\/wp-json\/wp\/v2\/chapter\/1445","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/guide.trustvalley.swiss\/de\/wp-json\/wp\/v2\/chapter"}],"about":[{"href":"https:\/\/guide.trustvalley.swiss\/de\/wp-json\/wp\/v2\/types\/chapter"}],"wp:attachment":[{"href":"https:\/\/guide.trustvalley.swiss\/de\/wp-json\/wp\/v2\/media?parent=1445"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/guide.trustvalley.swiss\/de\/wp-json\/wp\/v2\/categories?post=1445"},{"taxonomy":"searchablecategory","embeddable":true,"href":"https:\/\/guide.trustvalley.swiss\/de\/wp-json\/wp\/v2\/searchablecategory?post=1445"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}