{"id":12250,"date":"2021-06-24T12:06:12","date_gmt":"2021-06-24T10:06:12","guid":{"rendered":"https:\/\/usd.formwandler.rocks\/wurde-ich-gehackt\/"},"modified":"2022-01-27T09:28:47","modified_gmt":"2022-01-27T08:28:47","slug":"have-i-been-hacked","status":"publish","type":"page","link":"https:\/\/www.usd.de\/en\/security-analysis-pentests\/have-i-been-hacked\/","title":{"rendered":"Have I been hacked"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.9.4\" _module_preset=\"default\" width=\"100%\" custom_padding=\"0px||38px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_row _builder_version=\"4.9.4\" _module_preset=\"default\" width=\"100%\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.9.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.9.4\" _module_preset=\"default\" text_text_color=\"#FFFFFF\" text_font_size=\"30px\" text_line_height=\"1.2em\" header_font=\"Roboto||||||||\" header_text_color=\"#F07F1D\" header_font_size=\"50px\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-analysis-header-first-investigation-header.jpeg\" custom_margin=\"-31px||0px||false|false\" custom_padding=\"166px|60px|62px|60px|false|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h1 style=\"text-align: center;\">Have I been hacked?<\/h1>\n<p style=\"text-align: center;\">This question needs to be answered quickly and efficiently.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.9.4\" _module_preset=\"default\" custom_padding=\"||3px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.9.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.9.4\" _module_preset=\"default\" custom_margin=\"|0px|38px|0px|false|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" background_color=\"RGBA(0,0,0,0)\"]<\/p>\n<div class=\"e17459-7 x-section\">\n<div class=\"e17459-8 x-container max width\">\n<div class=\"e17459-9 x-column x-sm x-1-1\">\n<h2 class=\"h-custom-headline h2\">Recognize initial signs<\/h2>\n<div class=\"x-text\">\n<p>Attackers operate in secrecy. Hacker attacks can take months before they are noticed by a company. It is crucial to obtain certainty quickly and efficiently in the event of a suspected attack in order to minimize the resulting damage. An initial suspicion might exist, but is often not followed up due to incorrect risk assessment, lack of time, lack of know-how or lack of financial resources. Serious financial damage and loss of reputation are often the consequences of this misjudgment.<\/p>\n<p>Following events can be indicators of an attack and should definitely be taken seriously and examined in a structured manner:<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.13.1\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<table border=\"0\" style=\"border-collapse: collapse; width: 100%; padding: 0px; border: none; border-width: 0px; height: 23px;\">\n<tbody>\n<tr style=\"height: 23px;\">\n<td style=\"width: 3%; padding-left: 5px; padding-right: 0px; border: none; border-width: 0px; vertical-align: top; height: 23px;\"><i class=\"fas fa-angle-right\" i=\"\"><\/i><\/td>\n<td style=\"width: 97%; padding-left: 10px; padding-right: 0px; padding-top: 0px; border: none; border-width: 0px; height: 23px;\">Applications do no longer accept your login data<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.13.1\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<table border=\"0\" style=\"border-collapse: collapse; width: 100%; padding: 0px; border: none; border-width: 0px; height: 23px;\">\n<tbody>\n<tr style=\"height: 23px;\">\n<td style=\"width: 3%; padding-left: 5px; padding-right: 0px; border: none; border-width: 0px; vertical-align: top; height: 23px;\"><i class=\"fas fa-angle-right\" i=\"\"><\/i><\/td>\n<td style=\"width: 97%; padding-left: 10px; padding-right: 0px; padding-top: 0px; border: none; border-width: 0px; height: 23px;\">You email contacts receive fake emails on your behalf<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.13.1\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<table border=\"0\" style=\"border-collapse: collapse; width: 100%; padding: 0px; border: none; border-width: 0px; height: 23px;\">\n<tbody>\n<tr style=\"height: 23px;\">\n<td style=\"width: 3%; padding-left: 5px; padding-right: 0px; border: none; border-width: 0px; vertical-align: top; height: 23px;\"><i class=\"fas fa-angle-right\" i=\"\"><\/i><\/td>\n<td style=\"width: 97%; padding-left: 10px; padding-right: 0px; padding-top: 0px; border: none; border-width: 0px; height: 23px;\">An external party reports a security vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.13.1\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<table border=\"0\" style=\"border-collapse: collapse; width: 100%; padding: 0px; border: none; border-width: 0px; height: 23px;\">\n<tbody>\n<tr style=\"height: 23px;\">\n<td style=\"width: 3%; padding-left: 5px; padding-right: 0px; border: none; border-width: 0px; vertical-align: top; height: 23px;\"><i class=\"fas fa-angle-right\" i=\"\"><\/i><\/td>\n<td style=\"width: 97%; padding-left: 10px; padding-right: 0px; padding-top: 0px; border: none; border-width: 0px; height: 23px;\">An employee has clicked on a link in a phishing email<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.13.1\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<table border=\"0\" style=\"border-collapse: collapse; width: 100%; padding: 0px; border: none; border-width: 0px; height: 23px;\">\n<tbody>\n<tr style=\"height: 23px;\">\n<td style=\"width: 3%; padding-left: 5px; padding-right: 0px; border: none; border-width: 0px; vertical-align: top; height: 23px;\"><i class=\"fas fa-angle-right\" i=\"\"><\/i><\/td>\n<td style=\"width: 97%; padding-left: 10px; padding-right: 0px; padding-top: 0px; border: none; border-width: 0px; height: 23px;\">Unknown files appear on your systems<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.13.1\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<table border=\"0\" style=\"border-collapse: collapse; width: 100%; padding: 0px; border: none; border-width: 0px; height: 23px;\">\n<tbody>\n<tr style=\"height: 23px;\">\n<td style=\"width: 3%; padding-left: 5px; padding-right: 0px; border: none; border-width: 0px; vertical-align: top; height: 23px;\"><i class=\"fas fa-angle-right\" i=\"\"><\/i><\/td>\n<td style=\"width: 97%; padding-left: 10px; padding-right: 0px; padding-top: 0px; border: none; border-width: 0px; height: 23px;\">Your virus scanner suddenly disappeared<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.13.1\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<table border=\"0\" style=\"border-collapse: collapse; width: 100%; padding: 0px; border: none; border-width: 0px; height: 23px;\">\n<tbody>\n<tr style=\"height: 23px;\">\n<td style=\"width: 3%; padding-left: 5px; padding-right: 0px; border: none; border-width: 0px; vertical-align: top; height: 23px;\"><i class=\"fas fa-angle-right\" i=\"\"><\/i><\/td>\n<td style=\"width: 97%; padding-left: 10px; padding-right: 0px; padding-top: 0px; border: none; border-width: 0px; height: 23px;\">A lot of failed login attempts show up in the event logs, or you see logins from service accounts you cannot explain<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.13.1\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<table border=\"0\" style=\"border-collapse: collapse; width: 100%; padding: 0px; border: none; border-width: 0px; height: 23px;\">\n<tbody>\n<tr style=\"height: 23px;\">\n<td style=\"width: 3%; padding-left: 5px; padding-right: 0px; border: none; border-width: 0px; vertical-align: top; height: 23px;\"><i class=\"fas fa-angle-right\" i=\"\"><\/i><\/td>\n<td style=\"width: 97%; padding-left: 10px; padding-right: 0px; padding-top: 0px; border: none; border-width: 0px; height: 23px;\">Your monitoring tool shows you unusual disk utilization outside of working hours<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.13.1\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<table border=\"0\" style=\"border-collapse: collapse; width: 100%; padding: 0px; border: none; border-width: 0px; height: 23px;\">\n<tbody>\n<tr style=\"height: 23px;\">\n<td style=\"width: 3%; padding-left: 5px; padding-right: 0px; border: none; border-width: 0px; vertical-align: top; height: 23px;\"><i class=\"fas fa-angle-right\" i=\"\"><\/i><\/td>\n<td style=\"width: 97%; padding-left: 10px; padding-right: 0px; padding-top: 0px; border: none; border-width: 0px; height: 23px;\">You see load peaks in your firewall at unexplainable times<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"2_5,3_5\" _builder_version=\"4.9.4\" _module_preset=\"default\" custom_margin=\"30px||30px||true|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"2_5\" _builder_version=\"4.9.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-herolab-web-application-pentest.jpeg\" title_text=\"usd-herolab-web-application-pentest\" url=\"\/security-analysis-pentests\/pentest-webapplikationen\/\" _builder_version=\"4.9.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_5\" _builder_version=\"4.9.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.9.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3 class=\"h-custom-headline h3\">You want to be sure, even without a comprehensive it forensic investigation?<\/h3>\n<div class=\"x-text\">\n<p>Tell us about your suspicion. We are here to help.<\/p>\n<\/div>\n<div class=\"x-text\"><\/div>\n<p>[\/et_pb_text][et_pb_button button_url=\"\/en\/contact-form-analysis-pentests\/\" button_text=\"Contact us\" _builder_version=\"4.9.4\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.9.4\" _module_preset=\"default\" custom_padding=\"0px||31px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.9.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.9.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p><span>Our pragmatic process model provides initial indications of whether attackers are in your IT systems. This gives you clarity and enables you to act appropriately. A comprehensive IT forensic investigation only makes sense if there is a justified suspicion.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Have I been hacked? This question needs to be answered quickly and efficiently. Recognize initial signs Attackers operate in secrecy. Hacker attacks can take months before they are noticed by a company. It is crucial to obtain certainty quickly and efficiently in the event of a suspected attack in order to minimize the resulting damage. [&hellip;]<\/p>\n","protected":false},"author":96,"featured_media":0,"parent":15265,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-12250","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/12250","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/comments?post=12250"}],"version-history":[{"count":0,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/12250\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/15265"}],"wp:attachment":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media?parent=12250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}