{"id":44178,"date":"2023-01-13T14:12:12","date_gmt":"2023-01-13T13:12:12","guid":{"rendered":"https:\/\/www.skaylink.com\/?p=44178"},"modified":"2025-08-15T14:52:27","modified_gmt":"2025-08-15T12:52:27","slug":"phishing-attacken-trotz-mfa","status":"publish","type":"post","link":"https:\/\/www.skaylink.com\/de\/insights\/blog\/phishing-attacken-trotz-mfa\/","title":{"rendered":"Phishing-Attacken trotz Multi-Faktoren-Authentifizierung"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"44178\" class=\"elementor elementor-44178\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1e84fdf3 header-keyvisual-container e-flex e-con-boxed e-con e-parent\" data-id=\"1e84fdf3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-699fb06 elementor-align-left elementor-widget elementor-widget-breadcrumbs\" data-id=\"699fb06\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p id=\"breadcrumbs\"><span><span><a href=\"https:\/\/www.skaylink.com\/de\/\">Home<\/a><\/span><\/span><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-53bc2147 e-con-full e-flex e-con e-child\" data-id=\"53bc2147\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-79c32593 header-keyvisual-content e-con-full e-flex e-con e-child\" data-id=\"79c32593\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-327c0f2b e-con-full e-flex e-con e-child\" data-id=\"327c0f2b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4fc07768 elementor-widget elementor-widget-text-editor\" data-id=\"4fc07768\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Blog<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a545e elementor-widget elementor-widget-heading\" data-id=\"4a545e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Phishing-Attacken trotz Multi-Faktoren-Authentifizierung<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-96cc09c elementor-widget elementor-widget-text-editor\" data-id=\"96cc09c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWie Angreifer versuchen, die MFA zu umgehen \u2013 und was Sie dagegen tun k\u00f6nnen.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9a6dc75 e-flex e-con-boxed e-con e-parent\" data-id=\"9a6dc75\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-17855131 e-flex e-con-boxed e-con e-child\" data-id=\"17855131\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4d3b20a0 e-flex e-con-boxed e-con e-child\" data-id=\"4d3b20a0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ccf9c6c elementor-widget elementor-widget-text-editor\" data-id=\"2ccf9c6c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t13. Januar 2023\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-315d3fe8 e-flex e-con-boxed e-con e-child\" data-id=\"315d3fe8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-362c4a5e e-flex e-con-boxed e-con e-child\" data-id=\"362c4a5e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4532310a elementor-widget elementor-widget-author-box\" data-id=\"4532310a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"author-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-author-box\">\n\t\t\t\n\t\t\t<div class=\"elementor-author-box__text\">\n\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t<span class=\"elementor-author-box__name\">\n\t\t\t\t\t\t\tSkaylink\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-13772eae e-flex e-con-boxed e-con e-child\" data-id=\"13772eae\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d15a121 elementor-widget elementor-widget-author-box\" data-id=\"d15a121\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"author-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-author-box\">\n\t\t\t\n\t\t\t<div class=\"elementor-author-box__text\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-24c5b2e8 e-flex e-con-boxed e-con e-parent\" data-id=\"24c5b2e8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-37dd2bbb e-con-full e-flex e-con e-child\" data-id=\"37dd2bbb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-10ba6717 elementor-widget elementor-widget-heading\" data-id=\"10ba6717\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Wie Angreifer versuchen, die MFA zu umgehen \u2013 und was Sie dagegen tun k\u00f6nnen\u200b<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-73736f3e elementor-widget elementor-widget-text-editor\" data-id=\"73736f3e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Um Nutzerkonten in einer komplexen Infrastruktur vor unerlaubten Zugriffen zu sch\u00fctzen, ist die <a href=\"https:\/\/www.microsoft.com\/de-de\/security\/business\/identity-access\/azure-active-directory-mfa-multi-factor-authentication\" target=\"_blank\" rel=\"noopener\">Multi-Faktoren-Authentifizierung<\/a> (MFA) heute der Goldstandard. Erst durch einen zweiten Identit\u00e4tsnachweis, z. B. durch das Scannen eines Fingerabdrucks oder Eingabe eines an das Mobiltelefon gesendeten Codes, kann ein User dabei Konten und Apps \u00f6ffnen. Doch auch Angreifer haben dazugelernt und versuchen, die MFA mit unterschiedlichen Strategien zu umgehen. Aktuell dominieren dabei zwei Wege:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4938d1ed e-flex e-con-boxed e-con e-parent\" data-id=\"4938d1ed\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-139aebf7 e-con-full e-flex e-con e-child\" data-id=\"139aebf7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-769fea73 elementor-widget elementor-widget-heading\" data-id=\"769fea73\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Adversary-in-the-Middle (AitM)-Frameworks<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-16632e4b elementor-widget elementor-widget-text-editor\" data-id=\"16632e4b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Authentifiziert sich ein User erfolgreich bei einem Dienst, wird automatisch \u00fcber ein Cookie eine Sitzung implementiert. Dadurch muss der User sich nicht auf jeder neuen Seite neu ausweisen: Das Session-Cookie dient dem Webserver als Zugangsticket. Beim AiTM-Phishing versucht der Angreifer deshalb, sowohl die Anmeldeinformationen des Users als auch das Cookie des Users zu erhalten. So kann er den Authentifizierungsprozess selbst bei aktivierter MFA \u00fcberspringen und im Namen des Users handeln.<\/p><p><strong>Was passiert?<\/strong> \u2013 Sobald Nutzer*innen die Phishing-Website besuchen, leitet ein Webserver des Angreifers HTTP-Pakete der Nutzer*innen an einen Zielserver weiter, f\u00fcr den der Angreifer Zugriff m\u00f6chte, und umgekehrt. Da jedes HTTP per Proxy zur und von der urspr\u00fcnglichen Website geleitet wird, ist die Phishing-Website visuell identisch mit der urspr\u00fcnglichen Website. Das Erstellen einer eigenen Phishing-Website ist nicht n\u00f6tig.<\/p><p><strong>Wichtig:<\/strong> Der einzige sichtbare Unterschied zwischen der Phishing- und der Original-Website ist die URL.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ef588e elementor-widget elementor-widget-image\" data-id=\"6ef588e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"768\" height=\"444\" src=\"https:\/\/www.skaylink.com\/wp-content\/uploads\/2023\/01\/Figure1-overview-of-aitm-phishing-768x444.png\" class=\"attachment-medium_large size-medium_large wp-image-44186\" alt=\"\" srcset=\"https:\/\/www.skaylink.com\/wp-content\/uploads\/2023\/01\/Figure1-overview-of-aitm-phishing-768x444.png 768w, https:\/\/www.skaylink.com\/wp-content\/uploads\/2023\/01\/Figure1-overview-of-aitm-phishing-300x173.png 300w, https:\/\/www.skaylink.com\/wp-content\/uploads\/2023\/01\/Figure1-overview-of-aitm-phishing.png 799w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0012766 e-flex e-con-boxed e-con e-parent\" data-id=\"0012766\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-54492bb e-con-full e-flex e-con e-child\" data-id=\"54492bb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3bf6aed elementor-widget elementor-widget-heading\" data-id=\"3bf6aed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Pass-the-Cookie-Angriff<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-56f6727 elementor-widget elementor-widget-text-editor\" data-id=\"56f6727\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Bei einem &#8222;Pass-the-Cookie&#8220;-Angriff kompromittiert ein Angreifer das Device und die Browser-Cookies eines Users. Er ist vergleichbar mit einem \u201c<a href=\"https:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=36036\" target=\"_blank\" rel=\"noopener\">Pass-the-Hash<\/a>\u201c- oder \u201e<a href=\"https:\/\/learn.microsoft.com\/en-us\/defender-for-identity\/lateral-movement-alerts\" target=\"_blank\" rel=\"noopener\">Pass-the-Ticket<\/a>\u201c-Angriff in <a href=\"https:\/\/azure.microsoft.com\/de-de\/products\/active-directory\/?OCID=AIDcmmzzaokddl_SEM_0cc1c30aa6761d899e0ca0b7b6f5b395:G:s&amp;ef_id=0cc1c30aa6761d899e0ca0b7b6f5b395:G:s&amp;msclkid=0cc1c30aa6761d899e0ca0b7b6f5b395\" target=\"_blank\" rel=\"noopener\">Azure Active Directory<\/a>. Der Angreifer \u00fcbergibt das Sitzungs-Cookie an einen separaten Webbrowser auf einem anderen System und umgeht damit die Sicherheitskontrollen.<\/p><p><strong>Wichtig:<\/strong> Nutzer*innen, die \u00fcber pers\u00f6nliche Ger\u00e4te auf Ressourcen zugreifen, sind besonders gef\u00e4hrdet.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9b528a1 elementor-widget elementor-widget-image\" data-id=\"9b528a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"768\" height=\"422\" src=\"https:\/\/www.skaylink.com\/wp-content\/uploads\/2023\/01\/Cloud-token-theft_4_Pass-the-cookie-attack-flowchart-768x422-1.png\" class=\"attachment-medium_large size-medium_large wp-image-44184\" alt=\"\" srcset=\"https:\/\/www.skaylink.com\/wp-content\/uploads\/2023\/01\/Cloud-token-theft_4_Pass-the-cookie-attack-flowchart-768x422-1.png 768w, https:\/\/www.skaylink.com\/wp-content\/uploads\/2023\/01\/Cloud-token-theft_4_Pass-the-cookie-attack-flowchart-768x422-1-300x165.png 300w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d7efa26 e-flex e-con-boxed e-con e-parent\" data-id=\"d7efa26\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1d0a3c6 e-con-full e-flex e-con e-child\" data-id=\"1d0a3c6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-237b27d elementor-widget elementor-widget-heading\" data-id=\"237b27d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Gegenma\u00dfnahmen<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9e0beb4 elementor-widget elementor-widget-text-editor\" data-id=\"9e0beb4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Das Microsoft Detection and Response Team (DART) hat als Hauptrisiko f\u00fcr solche Angriffe Devices identifiziert, die zwar auf Unternehmensressourcen zugreifen, aber keine starken Sicherheitskontrollen besitzen. Vollst\u00e4ndige Transparenz dar\u00fcber, wie und wo sich alle User authentifizieren, kann das Risiko deshalb bedeutend senken. Was Sie als IT-Verantwortliche tun k\u00f6nnen:<\/p><ul><li>Nur bekannte Devices zulassen, die den von Microsoft empfohlenen Sicherheitsrichtlinien entsprechen<\/li><li>F\u00fcr nicht verwaltete Devices die Lebensdauer jeder Sitzung reduzieren und die App-Steuerung f\u00fcr bedingten Zugriff in <a href=\"https:\/\/learn.microsoft.com\/en-us\/defender-cloud-apps\/what-is-defender-for-cloud-apps\" target=\"_blank\" rel=\"noopener\">Microsoft Defender for Cloud Apps <\/a>implementieren<\/li><li>F\u00fcr User mit hohen Zugriffsrechten phishing-resistente MFA-L\u00f6sungen (<a href=\"https:\/\/support.microsoft.com\/de-de\/account-billing\/einrichten-eines-sicherheitsschl%C3%BCssels-als-%C3%BCberpr%C3%BCfungsmethode-2911cacd-efa5-4593-ae22-e09ae14c6698\" target=\"_blank\" rel=\"noopener\">FIDO2-Sicherheitsschl\u00fcssel<\/a>, <a href=\"https:\/\/learn.microsoft.com\/de-de\/windows\/security\/identity-protection\/hello-for-business\/hello-overview\" target=\"_blank\" rel=\"noopener\">Windows Hello for Business<\/a>, <a href=\"https:\/\/learn.microsoft.com\/de-de\/azure\/active-directory\/authentication\/active-directory-certificate-based-authentication-get-started\" target=\"_blank\" rel=\"noopener\">zertifikatbasierte Authentifizierung<\/a>) implementieren<\/li><li>User mit hohen Zugriffsrechten sollten eine getrennte Cloud-Identit\u00e4t f\u00fcr Administratoraktivit\u00e4ten nutzen<\/li><\/ul><p>Ist ein User kompromittiert, kann in Azure AD ein Aktualisierungs-Token widerrufen werden. Der User ist so gezwungen, sich neu zu authentifizieren. Dadurch verliert ein gestohlenes Token seinen Sinn f\u00fcr den Angreifer, auch wenn es zeitlich noch g\u00fcltig w\u00e4re. Das Konto eines kompromittierten Users sollte au\u00dferdem auf Auff\u00e4lligkeiten untersucht werden, z. B. hinzugef\u00fcgte Postfachregeln zum Weiterleiten oder Ausblenden von E-Mails, zus\u00e4tzliche Authentifizierungsmethoden, die MFA hinzugef\u00fcgt wurden, zus\u00e4tzliche Ger\u00e4teregistrierung und \u00e4hnliches.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9b898a1 elementor-widget elementor-widget-image\" data-id=\"9b898a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"768\" height=\"696\" src=\"https:\/\/www.skaylink.com\/wp-content\/uploads\/2023\/01\/proxy-architecture-768x696.png\" class=\"attachment-medium_large size-medium_large wp-image-44182\" alt=\"\" srcset=\"https:\/\/www.skaylink.com\/wp-content\/uploads\/2023\/01\/proxy-architecture-768x696.png 768w, https:\/\/www.skaylink.com\/wp-content\/uploads\/2023\/01\/proxy-architecture-300x272.png 300w, https:\/\/www.skaylink.com\/wp-content\/uploads\/2023\/01\/proxy-architecture.png 987w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-000d806 e-flex e-con-boxed e-con e-parent\" data-id=\"000d806\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-dfe1f46 e-con-full e-flex e-con e-child\" data-id=\"dfe1f46\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-87cdc0a elementor-widget elementor-widget-text-editor\" data-id=\"87cdc0a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Gerade in komplexen Multicloud-Szenarien, in denen von vielen unterschiedlichen Devices und von wechselnden Orten auf Ressourcen zugegriffen wird, reichen auch moderne Standardl\u00f6sungen nicht aus. Es braucht eine durchdachte, auf die Bed\u00fcrfnisse und Gegebenheiten des Unternehmens angepasste Sicherheitsarchitektur. Die <a href=\"https:\/\/www.skaylink.com\/de\/cloud-sicherheit-compliance\/\">Skaylink-Experten<\/a> beraten Kunden hier zum richtigen Ansatz und \u00fcbernehmen auf Wunsch gern Security-Aufgaben \u00fcber das <a href=\"https:\/\/www.skaylink.com\/de\/cloud-sicherheit-compliance\/cyber-security-center\/\">Cyber Security Center<\/a>. Melden Sie sich bei uns f\u00fcr ein erstes Gespr\u00e4ch!<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-61311ee e-flex e-con-boxed e-con e-parent\" data-id=\"61311ee\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-89889d1 elementor-hidden-desktop elementor-widget elementor-widget-heading\" data-id=\"89889d1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Case Stories<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9957261 elementor-arrows-position-inside elementor-widget elementor-widget-loop-carousel\" data-id=\"9957261\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;template_id&quot;:70874,&quot;slides_to_show&quot;:&quot;1&quot;,&quot;speed&quot;:800,&quot;_skin&quot;:&quot;post&quot;,&quot;slides_to_show_tablet&quot;:&quot;2&quot;,&quot;slides_to_show_mobile&quot;:&quot;1&quot;,&quot;slides_to_scroll&quot;:&quot;1&quot;,&quot;edit_handle_selector&quot;:&quot;.elementor-loop-container&quot;,&quot;arrows&quot;:&quot;yes&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;image_spacing_custom_tablet_extra&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"loop-carousel.post\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"swiper elementor-loop-container elementor-grid\" role=\"list\" dir=\"ltr\">\n\t\t\t\t<div class=\"swiper-wrapper\" aria-live=\"polite\">\n\t\t<style id=\"loop-dynamic-70874\">.e-loop-item-78012 .elementor-element.elementor-element-534ce23f:not(.elementor-motion-effects-element-type-background), .e-loop-item-78012 .elementor-element.elementor-element-534ce23f > .elementor-motion-effects-container > .elementor-motion-effects-layer{background-image:url(\"https:\/\/www.skaylink.com\/wp-content\/uploads\/2024\/07\/Headerbild-Detail-Page.jpg\");}<\/style><style id=\"loop-70874\">.elementor-70874 .elementor-element.elementor-element-55762ecb{--display:flex;--min-height:550px;--flex-direction:row;--container-widget-width:calc( ( 1 - var( --container-widget-flex-grow ) ) * 100% );--container-widget-height:100%;--container-widget-flex-grow:1;--container-widget-align-self:stretch;--flex-wrap-mobile:wrap;--align-items:stretch;--gap:0px 0px;--row-gap:0px;--column-gap:0px;--overflow:hidden;--margin-top:0%;--margin-bottom:0%;--margin-left:0%;--margin-right:0%;--padding-top:0rem;--padding-bottom:0rem;--padding-left:0rem;--padding-right:0rem;}.elementor-70874 .elementor-element.elementor-element-534ce23f{--display:flex;--padding-top:0px;--padding-bottom:0px;--padding-left:0px;--padding-right:0px;}.elementor-70874 .elementor-element.elementor-element-534ce23f:not(.elementor-motion-effects-element-type-background), .elementor-70874 .elementor-element.elementor-element-534ce23f > .elementor-motion-effects-container > .elementor-motion-effects-layer{background-position:center center;background-size:cover;}.elementor-70874 .elementor-element.elementor-element-373b26ac{--display:flex;--flex-direction:column;--container-widget-width:100%;--container-widget-height:initial;--container-widget-flex-grow:0;--container-widget-align-self:initial;--flex-wrap-mobile:wrap;--justify-content:center;--gap:0px 0px;--row-gap:0px;--column-gap:0px;}.elementor-70874 .elementor-element.elementor-element-373b26ac.e-con{--align-self:center;}.elementor-70874 .elementor-element.elementor-element-0fe0875{--display:flex;--flex-direction:column;--container-widget-width:100%;--container-widget-height:initial;--container-widget-flex-grow:0;--container-widget-align-self:initial;--flex-wrap-mobile:wrap;--justify-content:center;--gap:0px 0px;--row-gap:0px;--column-gap:0px;}.elementor-70874 .elementor-element.elementor-element-0fe0875.e-con{--align-self:center;}.elementor-widget-text-editor{font-family:var( --e-global-typography-text-font-family ), Sans-serif;font-size:var( --e-global-typography-text-font-size );font-weight:var( --e-global-typography-text-font-weight );text-decoration:var( --e-global-typography-text-text-decoration );line-height:var( --e-global-typography-text-line-height );color:var( --e-global-color-text );}.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:var( --e-global-color-primary );}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap, .elementor-widget-text-editor.elementor-drop-cap-view-default .elementor-drop-cap{color:var( --e-global-color-primary );border-color:var( --e-global-color-primary );}.elementor-70874 .elementor-element.elementor-element-66b75a3{font-family:var( --e-global-typography-019d6db-font-family ), Sans-serif;font-size:var( --e-global-typography-019d6db-font-size );font-weight:var( --e-global-typography-019d6db-font-weight );text-decoration:var( --e-global-typography-019d6db-text-decoration );line-height:var( --e-global-typography-019d6db-line-height );letter-spacing:var( --e-global-typography-019d6db-letter-spacing );word-spacing:var( --e-global-typography-019d6db-word-spacing );color:var( --e-global-color-c37e4b1 );}.elementor-widget-heading .elementor-heading-title{font-family:var( --e-global-typography-primary-font-family ), Sans-serif;font-weight:var( --e-global-typography-primary-font-weight );color:var( --e-global-color-primary );}.elementor-70874 .elementor-element.elementor-element-b58affb .elementor-heading-title{font-family:var( --e-global-typography-849cb99-font-family ), Sans-serif;font-size:var( --e-global-typography-849cb99-font-size );font-weight:var( --e-global-typography-849cb99-font-weight );text-decoration:var( --e-global-typography-849cb99-text-decoration );line-height:var( --e-global-typography-849cb99-line-height );letter-spacing:var( --e-global-typography-849cb99-letter-spacing );word-spacing:var( --e-global-typography-849cb99-word-spacing );color:var( --e-global-color-text );}.elementor-70874 .elementor-element.elementor-element-b58affb > .elementor-widget-container{margin:0em 0em 3em 0em;}.elementor-70874 .elementor-element.elementor-element-29d94ff{font-family:var( --e-global-typography-9ae4c6f-font-family ), Sans-serif;font-size:var( --e-global-typography-9ae4c6f-font-size );font-weight:var( --e-global-typography-9ae4c6f-font-weight );text-decoration:var( --e-global-typography-9ae4c6f-text-decoration );line-height:var( --e-global-typography-9ae4c6f-line-height );letter-spacing:var( --e-global-typography-9ae4c6f-letter-spacing );word-spacing:var( --e-global-typography-9ae4c6f-word-spacing );}.elementor-70874 .elementor-element.elementor-element-29d94ff > .elementor-widget-container{margin:0em 0em 2em 0em;}.elementor-widget-button .elementor-button{font-family:var( --e-global-typography-accent-font-family ), Sans-serif;font-size:var( --e-global-typography-accent-font-size );font-weight:var( --e-global-typography-accent-font-weight );line-height:var( --e-global-typography-accent-line-height );background-color:var( --e-global-color-accent );}.elementor-70874 .elementor-element.elementor-element-79b359c .elementor-button-content-wrapper{flex-direction:row-reverse;}.elementor-70874 .elementor-element.elementor-element-79b359c .elementor-button .elementor-button-content-wrapper{gap:10px;}.elementor-70874 .elementor-element.elementor-element-79b359c .elementor-button{fill:var( --e-global-color-599c03e );color:var( --e-global-color-599c03e );background-color:var( --e-global-color-primary );border-radius:8px 8px 8px 8px;}.elementor-70874 .elementor-element.elementor-element-79b359c .elementor-button:hover, .elementor-70874 .elementor-element.elementor-element-79b359c .elementor-button:focus{background-color:var( --e-global-color-75b740e );}@media(min-width:577px){.elementor-70874 .elementor-element.elementor-element-534ce23f{--width:50%;}.elementor-70874 .elementor-element.elementor-element-373b26ac{--width:8.33333%;}.elementor-70874 .elementor-element.elementor-element-0fe0875{--width:33.333333%;}}@media(max-width:992px) and (min-width:577px){.elementor-70874 .elementor-element.elementor-element-534ce23f{--width:100%;}.elementor-70874 .elementor-element.elementor-element-373b26ac{--width:100%;}.elementor-70874 .elementor-element.elementor-element-0fe0875{--width:100%;}}@media(max-width:992px){.elementor-70874 .elementor-element.elementor-element-55762ecb{--min-height:0px;--flex-wrap:wrap;}.elementor-70874 .elementor-element.elementor-element-534ce23f{--min-height:280px;}.elementor-70874 .elementor-element.elementor-element-0fe0875{--padding-top:30px;--padding-bottom:0px;--padding-left:0px;--padding-right:0px;}.elementor-widget-text-editor{font-size:var( --e-global-typography-text-font-size );line-height:var( --e-global-typography-text-line-height );}.elementor-70874 .elementor-element.elementor-element-66b75a3{font-size:var( --e-global-typography-019d6db-font-size );line-height:var( --e-global-typography-019d6db-line-height );letter-spacing:var( --e-global-typography-019d6db-letter-spacing );word-spacing:var( --e-global-typography-019d6db-word-spacing );}.elementor-70874 .elementor-element.elementor-element-b58affb .elementor-heading-title{font-size:var( --e-global-typography-849cb99-font-size );line-height:var( --e-global-typography-849cb99-line-height );letter-spacing:var( --e-global-typography-849cb99-letter-spacing );word-spacing:var( --e-global-typography-849cb99-word-spacing );}.elementor-70874 .elementor-element.elementor-element-29d94ff{font-size:var( --e-global-typography-9ae4c6f-font-size );line-height:var( --e-global-typography-9ae4c6f-line-height );letter-spacing:var( --e-global-typography-9ae4c6f-letter-spacing );word-spacing:var( --e-global-typography-9ae4c6f-word-spacing );}.elementor-widget-button .elementor-button{font-size:var( --e-global-typography-accent-font-size );line-height:var( --e-global-typography-accent-line-height );}}@media(max-width:576px){.elementor-70874 .elementor-element.elementor-element-534ce23f{--min-height:210px;}.elementor-70874 .elementor-element.elementor-element-373b26ac{--padding-top:12%;--padding-bottom:12%;--padding-left:7%;--padding-right:7%;}.elementor-widget-text-editor{font-size:var( --e-global-typography-text-font-size );line-height:var( --e-global-typography-text-line-height );}.elementor-70874 .elementor-element.elementor-element-66b75a3{font-size:var( --e-global-typography-019d6db-font-size );line-height:var( --e-global-typography-019d6db-line-height );letter-spacing:var( --e-global-typography-019d6db-letter-spacing );word-spacing:var( --e-global-typography-019d6db-word-spacing );}.elementor-70874 .elementor-element.elementor-element-b58affb .elementor-heading-title{font-size:var( --e-global-typography-849cb99-font-size );line-height:var( --e-global-typography-849cb99-line-height );letter-spacing:var( --e-global-typography-849cb99-letter-spacing );word-spacing:var( --e-global-typography-849cb99-word-spacing );}.elementor-70874 .elementor-element.elementor-element-29d94ff{font-size:var( --e-global-typography-9ae4c6f-font-size );line-height:var( --e-global-typography-9ae4c6f-line-height );letter-spacing:var( --e-global-typography-9ae4c6f-letter-spacing );word-spacing:var( --e-global-typography-9ae4c6f-word-spacing );}.elementor-widget-button .elementor-button{font-size:var( --e-global-typography-accent-font-size );line-height:var( --e-global-typography-accent-line-height );}}<\/style>\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"70874\" class=\"elementor elementor-70874 elementor-57266 elementor-57266 swiper-slide e-loop-item e-loop-item-78012 post-78012 page type-page status-publish has-post-thumbnail hentry category-uncategorized\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-55762ecb e-flex e-con-boxed e-con e-parent\" data-id=\"55762ecb\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-534ce23f e-con-full e-flex e-con e-child\" data-id=\"534ce23f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-373b26ac e-con-full elementor-hidden-tablet elementor-hidden-mobile e-flex e-con e-child\" data-id=\"373b26ac\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0fe0875 e-con-full e-flex e-con e-child\" data-id=\"0fe0875\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-66b75a3 elementor-widget elementor-widget-text-editor\" data-id=\"66b75a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tUncategorized\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b58affb elementor-widget elementor-widget-heading\" data-id=\"b58affb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber Incident Response<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29d94ff elementor-widget elementor-widget-text-editor\" data-id=\"29d94ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tEgal was passiert ist \u2013 Ransomware, Kompromittierung, Infektion oder unbefugte Zugriffe \u2013 unsere Expert*innen stehen Ihnen schnell zur Seite.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-79b359c elementor-widget elementor-widget-button\" data-id=\"79b359c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.skaylink.com\/de\/cloud-sicherheit-compliance\/cyber-incident-response\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"skaylinkicon- skaylink-icon-arrow\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Weiterlesen<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-prev\" role=\"button\" tabindex=\"0\" aria-label=\"Voriger\">\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-next\" role=\"button\" tabindex=\"0\" aria-label=\"N\u00e4chster\">\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Wie Angreifer versuchen, die MFA zu umgehen \u2013 und was Sie dagegen tun k\u00f6nnen.<\/p>\n","protected":false},"author":14,"featured_media":44197,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[26],"tags":[125,126],"class_list":["post-44178","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-microsoft","tag-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.skaylink.com\/de\/wp-json\/wp\/v2\/posts\/44178","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.skaylink.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.skaylink.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.skaylink.com\/de\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.skaylink.com\/de\/wp-json\/wp\/v2\/comments?post=44178"}],"version-history":[{"count":25,"href":"https:\/\/www.skaylink.com\/de\/wp-json\/wp\/v2\/posts\/44178\/revisions"}],"predecessor-version":[{"id":88574,"href":"https:\/\/www.skaylink.com\/de\/wp-json\/wp\/v2\/posts\/44178\/revisions\/88574"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.skaylink.com\/de\/wp-json\/wp\/v2\/media\/44197"}],"wp:attachment":[{"href":"https:\/\/www.skaylink.com\/de\/wp-json\/wp\/v2\/media?parent=44178"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.skaylink.com\/de\/wp-json\/wp\/v2\/categories?post=44178"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.skaylink.com\/de\/wp-json\/wp\/v2\/tags?post=44178"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}