{"id":119105,"date":"2022-11-08T08:00:00","date_gmt":"2022-11-08T07:00:00","guid":{"rendered":"http:\/\/e3mag.com\/?p=119105"},"modified":"2024-01-19T12:54:01","modified_gmt":"2024-01-19T11:54:01","slug":"supply-chain-security","status":"publish","type":"post","link":"https:\/\/e3mag.com\/de\/supply-chain-security\/","title":{"rendered":"Supply Chain Security"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">43 Prozent der deutschen Lieferketten durch Ransomware kompromittiert<\/h2>\n\n\n\n<p>Trend Micro, ein Anbieter von Cybersicherheitsl\u00f6sungen, ver\u00f6ffentlicht eine neue Studie, aus der hervorgeht, dass Unternehmen wegen ihrer umfangreichen Lieferketten zunehmend durch Ransomware gef\u00e4hrdet sind. So waren bei 43 Prozent der befragten deutschen Unternehmen schon einmal Firmen in der Lieferkette von einem Ransomware-Angriff betroffen. Die Entwicklungen sind besonders brisant, da potenziell weniger gut gesicherte KMUs f\u00fcr mehr als ein Drittel der deutschen Unternehmen einen bedeutenden Teil der Lieferkette ausmachen.<\/p>\n\n\n\n<p>Vor einem Jahr f\u00fchrte ein Angriff auf einen Anbieter von IT-Verwaltungssoftware zur Kompromittierung zahlreicher Managed Services Provider und Tausender nachgeschalteter Kunden. Dennoch teilen nur 40 Prozent der Unternehmen in Deutschland ihr Wissen \u00fcber Ransomware-Angriffe mit ihren Lieferanten. Dar\u00fcber hinaus gibt ein Drittel aller Befragten in Deutschland an, dass es potenziell n\u00fctzliche Informationen \u00fcber diese Cyberbedrohungen nicht an seine Partner weitergibt.<\/p><div class=\"great-fullsize-content-de great-entity-placement\" style=\"float: left;\" id=\"great-1464667763\"><div id=\"great-776345125\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6ZGXMPyM-nU\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"banner_26-04_29_1200x150\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3.jpg\" alt=\"\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div><\/div>\n\n\n\n<p>Eine m\u00f6gliche Ursache ist, dass die Unternehmen erst gar nicht \u00fcber diese Informationen verf\u00fcgen, um sie weiterreichen zu k\u00f6nnen. Denn ihre F\u00e4higkeiten, verd\u00e4chtige Aktivit\u00e4ten im Zusammenhang mit Ransomware-Attacken zu erkennen, sind beunruhigend gering: Nur 20 Prozent der deutschen Unternehmen sehen sich dazu in der Lage, Lateral Movement zu bemerken, also die Bewegung eines Angreifers innerhalb ihres Netzwerks. Ebenfalls deutlich verbesserungsw\u00fcrdig sind die Erkennungsraten f\u00fcr das initiale Eindringen in ihre Systeme, den Abfluss von Daten, die eigentliche Ransomware-Payload und den missbr\u00e4uchlichen Einsatz eigentlich legitimer Tools wie PSexec oder Cobalt Strike.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Eine Studie ergab, dass drei Viertel aller deutschen IT-F\u00fchrungskr\u00e4fte davon ausgehen, dass ihre Partner und Kunden ihr Unternehmen zu einem attraktiveren Ransomware-Ziel machen.<\/p>\n","protected":false},"author":1746,"featured_media":119107,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"0","footnotes":""},"categories":[4,41842],"tags":[4454,41871,143,3862,7631,1301,3865],"coauthors":[30783],"class_list":["post-119105","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-management","category-mag-22-10","tag-lieferkette","tag-mag-22-10","tag-management","tag-ransomware","tag-scm","tag-supply-chain-management","tag-trendmicro","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin.jpg",1200,540,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin-80x80.jpg",80,80,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin.jpg",400,180,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin.jpg",1200,540,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin-1168x526.jpg",1168,526,true],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin.jpg",1200,540,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin.jpg",1200,540,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin.jpg",1200,540,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin.jpg",1200,540,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin.jpg",1200,540,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin.jpg",1200,540,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin.jpg",1200,540,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin.jpg",600,270,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin.jpg",600,270,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Eine Studie ergab, dass drei Viertel aller deutschen IT-F\u00fchrungskr\u00e4fte davon ausgehen, dass ihre Partner und Kunden ihr Unternehmen zu einem attraktiveren Ransomware-Ziel machen.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/de\/category\/management\/\" rel=\"category tag\">Business-Management<\/a>, <a href=\"https:\/\/e3mag.com\/de\/category\/mag-22-10\/\" rel=\"category tag\">Mag 22-10<\/a>","author_info_v2":{"name":"Richard Werner, Trend Micro","url":"https:\/\/e3mag.com\/de\/author\/richard-werner\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/posts\/119105","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/users\/1746"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/comments?post=119105"}],"version-history":[{"count":1,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/posts\/119105\/revisions"}],"predecessor-version":[{"id":137679,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/posts\/119105\/revisions\/137679"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/media\/119107"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/media?parent=119105"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/categories?post=119105"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/tags?post=119105"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/coauthors?post=119105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}