{"id":119105,"date":"2022-11-08T08:00:00","date_gmt":"2022-11-08T07:00:00","guid":{"rendered":"http:\/\/e3mag.com\/?p=119105"},"modified":"2024-01-19T12:54:01","modified_gmt":"2024-01-19T11:54:01","slug":"supply-chain-security","status":"publish","type":"post","link":"https:\/\/e3mag.com\/en\/supply-chain-security\/","title":{"rendered":"Supply Chain Security"},"content":{"rendered":"<h2 class=\"wp-block-heading\">43 percent of German supply chains compromised by ransomware<\/h2>\n\n\n\n<p>Trend Micro, a provider of cybersecurity solutions, released a new study showing that companies are increasingly at risk from ransomware because of their extensive supply chains. For example, 43 percent of the German companies surveyed have had companies in their supply chain affected by a ransomware attack. The developments are particularly explosive because potentially less well-secured SMEs make up a significant part of the supply chain for more than a third of German companies.<\/p>\n\n\n\n<p>A year ago, an attack on an IT management software vendor led to the compromise of numerous managed services providers and thousands of downstream customers. Yet only 40 percent of companies in Germany share their knowledge of ransomware attacks with their suppliers. In addition, one-third of all respondents in Germany say they do not share potentially useful information about these cyberthreats with their partners.<\/p><div id=\"great-3467284382\" class=\"great-fullsize-content-en great-entity-placement\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6ZGXMPyM-nU\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"banner_26-04_29_1200x150\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3.jpg\" alt=\"\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n\n\n\n<p>One possible reason is that companies do not have this information to pass on in the first place. This is because their ability to detect suspicious activity related to ransomware attacks is worryingly low: only 20 percent of German companies are able to detect lateral movement, i.e. the movement of an attacker within their network. Also in need of significant improvement are the detection rates for the initial intrusion into their systems, the outflow of data, the actual ransomware payload and the misuse of actually legitimate tools such as PSexec or Cobalt Strike.<\/p>","protected":false},"excerpt":{"rendered":"<p>One study found that three-quarters of all German IT executives believe their partners and customers are making their companies a more attractive ransomware target.<\/p>","protected":false},"author":1746,"featured_media":119107,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"0","footnotes":""},"categories":[4,41842],"tags":[4454,41871,143,3862,7631,1301,3865],"coauthors":[30783],"class_list":["post-119105","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-management","category-mag-22-10","tag-lieferkette","tag-mag-22-10","tag-management","tag-ransomware","tag-scm","tag-supply-chain-management","tag-trendmicro","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin.jpg",1200,540,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin-80x80.jpg",80,80,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin.jpg",400,180,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin.jpg",1200,540,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin-1168x526.jpg",1168,526,true],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin.jpg",1200,540,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin.jpg",1200,540,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin.jpg",1200,540,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin.jpg",1200,540,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin.jpg",1200,540,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin.jpg",1200,540,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin.jpg",1200,540,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin.jpg",600,270,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin.jpg",600,270,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/11\/shutterstock_331812122_Sashkin-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Eine Studie ergab, dass drei Viertel aller deutschen IT-F\u00fchrungskr\u00e4fte davon ausgehen, dass ihre Partner und Kunden ihr Unternehmen zu einem attraktiveren Ransomware-Ziel machen.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/en\/category\/management\/\" rel=\"category tag\">Business-Management<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/mag-22-10\/\" rel=\"category tag\">Mag 22-10<\/a>","author_info_v2":{"name":"Richard Werner, Trend Micro","url":"https:\/\/e3mag.com\/en\/author\/richard-werner\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/119105","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/1746"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/comments?post=119105"}],"version-history":[{"count":1,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/119105\/revisions"}],"predecessor-version":[{"id":137679,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/119105\/revisions\/137679"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media\/119107"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=119105"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/categories?post=119105"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=119105"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=119105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}