{"id":2761,"date":"2019-07-04T13:58:38","date_gmt":"2019-07-04T11:58:38","guid":{"rendered":"https:\/\/www.prosoft.de\/blog\/?p=2761"},"modified":"2025-09-25T12:35:44","modified_gmt":"2025-09-25T10:35:44","slug":"ransomware-as-a-service","status":"publish","type":"post","link":"https:\/\/www.prosoft.de\/blog\/ransomware-as-a-service\/","title":{"rendered":"Ransomware-as-a Service"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8220;1&#8243; specialty=&#8220;on&#8220; custom_css_main_1=&#8220;max-width:15%;&#8220; disabled_on=&#8220;off|off|&#8220; _builder_version=&#8220;3.22.3&#8243; module_alignment=&#8220;center&#8220; custom_padding=&#8220;2px|0px|0|0px|false|false&#8220;][et_pb_column type=&#8220;1_4&#8243; _builder_version=&#8220;3.0.47&#8243;][\/et_pb_column][et_pb_column type=&#8220;3_4&#8243; specialty_columns=&#8220;3&#8243; _builder_version=&#8220;3.0.47&#8243;][et_pb_row_inner custom_padding=&#8220;23px|0px|4px|0px|false|false&#8220; admin_label=&#8220;Zeile&#8220; _builder_version=&#8220;3.0.47&#8243;][et_pb_column_inner type=&#8220;4_4&#8243; saved_specialty_column_type=&#8220;3_4&#8243; _builder_version=&#8220;3.0.47&#8243;][et_pb_post_title title=&#8220;off&#8220; meta=&#8220;off&#8220; featured_placement=&#8220;above&#8220; admin_label=&#8220;Beitragsbild&#8220; _builder_version=&#8220;3.22.7&#8243; locked=&#8220;off&#8220;][\/et_pb_post_title][et_pb_post_title meta=&#8220;off&#8220; featured_image=&#8220;off&#8220; admin_label=&#8220;Beitragstitel&#8220; _builder_version=&#8220;3.24.1&#8243; custom_margin=&#8220;20px||&#8220; locked=&#8220;off&#8220;][\/et_pb_post_title][\/et_pb_column_inner][\/et_pb_row_inner][\/et_pb_column][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; specialty=&#8220;on&#8220; custom_css_main_1=&#8220;max-width:15%;&#8220; disabled_on=&#8220;off|off|&#8220; _builder_version=&#8220;3.22.7&#8243; module_alignment=&#8220;center&#8220; custom_padding=&#8220;0|0px|0|0px|false|false&#8220;][et_pb_column type=&#8220;1_4&#8243; _builder_version=&#8220;3.0.47&#8243;][et_pb_text admin_label=&#8220;Tag&#8220; _builder_version=&#8220;3.24.1&#8243; _dynamic_attributes=&#8220;content&#8220; custom_padding=&#8220;||0px&#8220; locked=&#8220;off&#8220;]@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9kYXRlIiwic2V0dGluZ3MiOnsiYmVmb3JlIjoiIiwiYWZ0ZXIiOiIuIiwiZGF0ZV9mb3JtYXQiOiJjdXN0b20iLCJjdXN0b21fZGF0ZV9mb3JtYXQiOiJkIn19@[\/et_pb_text][et_pb_text admin_label=&#8220;Monat&#8220; _builder_version=&#8220;3.21.1&#8243; _dynamic_attributes=&#8220;content&#8220; custom_margin=&#8220;-5px||2px&#8220; custom_padding=&#8220;||0px&#8220; locked=&#8220;on&#8220;]@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9kYXRlIiwic2V0dGluZ3MiOnsiYmVmb3JlIjoiIiwiYWZ0ZXIiOiIiLCJkYXRlX2Zvcm1hdCI6ImN1c3RvbSIsImN1c3RvbV9kYXRlX2Zvcm1hdCI6Ik0ifX0=@[\/et_pb_text][et_pb_divider color=&#8220;#939393&#8243; divider_weight=&#8220;5px&#8220; _builder_version=&#8220;3.19.4&#8243; max_width=&#8220;25px&#8220; height=&#8220;0px&#8220; custom_margin=&#8220;0px||&#8220; locked=&#8220;on&#8220;][\/et_pb_divider][et_pb_text admin_label=&#8220;Jahr&#8220; _builder_version=&#8220;3.21.1&#8243; _dynamic_attributes=&#8220;content&#8220; text_font_size=&#8220;11px&#8220; custom_margin=&#8220;0px||&#8220; locked=&#8220;on&#8220;]@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9kYXRlIiwic2V0dGluZ3MiOnsiYmVmb3JlIjoiIiwiYWZ0ZXIiOiIiLCJkYXRlX2Zvcm1hdCI6ImN1c3RvbSIsImN1c3RvbV9kYXRlX2Zvcm1hdCI6IlkifX0=@[\/et_pb_text][et_pb_text admin_label=&#8220;Schlagw\u00f6rter&#8220; _builder_version=&#8220;3.19.5&#8243; _dynamic_attributes=&#8220;content&#8220; text_font=&#8220;|300|on||||||&#8220; text_text_color=&#8220;#000000&#8243; text_font_size=&#8220;12px&#8220; text_line_height=&#8220;1.4em&#8220; border_width_top=&#8220;1px&#8220; border_color_top=&#8220;#939393&#8243; border_style_top=&#8220;dotted&#8220; custom_margin=&#8220;10px||&#8220; custom_padding=&#8220;14px||&#8220; saved_tabs=&#8220;all&#8220; locked=&#8220;on&#8220;]@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF90YWdzIiwic2V0dGluZ3MiOnsiYmVmb3JlIjoiIiwiYWZ0ZXIiOiIiLCJsaW5rX3RvX3Rlcm1fcGFnZSI6Im9mZiIsInNlcGFyYXRvciI6IiwgIiwiY2F0ZWdvcnlfdHlwZSI6InBvc3RfdGFnIn19@[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;3_4&#8243; specialty_columns=&#8220;3&#8243; _builder_version=&#8220;3.0.47&#8243;][et_pb_row_inner custom_padding=&#8220;23px|0px|32px|0px|false|false&#8220; admin_label=&#8220;Zeile&#8220; _builder_version=&#8220;3.24.1&#8243;][et_pb_column_inner type=&#8220;4_4&#8243; saved_specialty_column_type=&#8220;3_4&#8243; _builder_version=&#8220;3.0.47&#8243;][et_pb_text admin_label=&#8220;Introtext&#8220; _builder_version=&#8220;3.24.1&#8243; text_font=&#8220;||on||||||&#8220; border_width_top=&#8220;1px&#8220; border_color_top=&#8220;#939393&#8243; border_width_bottom=&#8220;1px&#8220; border_color_bottom=&#8220;#939393&#8243; custom_margin=&#8220;10px||25px&#8220; custom_padding=&#8220;5px||5px&#8220; z_index_tablet=&#8220;500&#8243; text_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; text_text_shadow_vertical_length_tablet=&#8220;0px&#8220; text_text_shadow_blur_strength_tablet=&#8220;1px&#8220; link_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; link_text_shadow_vertical_length_tablet=&#8220;0px&#8220; link_text_shadow_blur_strength_tablet=&#8220;1px&#8220; ul_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; ul_text_shadow_vertical_length_tablet=&#8220;0px&#8220; ul_text_shadow_blur_strength_tablet=&#8220;1px&#8220; ol_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; ol_text_shadow_vertical_length_tablet=&#8220;0px&#8220; ol_text_shadow_blur_strength_tablet=&#8220;1px&#8220; quote_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; quote_text_shadow_vertical_length_tablet=&#8220;0px&#8220; quote_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_2_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_2_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_2_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_3_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_3_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_3_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_4_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_4_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_4_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_5_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_5_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_5_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_6_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_6_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_6_text_shadow_blur_strength_tablet=&#8220;1px&#8220; border_width_top_tablet=&#8220;1px&#8220; border_width_top_phone=&#8220;1px&#8220; border_width_bottom_tablet=&#8220;1px&#8220; border_width_bottom_phone=&#8220;1px&#8220; box_shadow_horizontal_tablet=&#8220;0px&#8220; box_shadow_vertical_tablet=&#8220;0px&#8220; box_shadow_blur_tablet=&#8220;40px&#8220; box_shadow_spread_tablet=&#8220;0px&#8220; locked=&#8220;off&#8220;]<\/p>\n<p><strong>Sodin: Erste \u201esich-selbst-installierende\u201c Ransomware!<\/strong><br \/>Die neue Ransomware Sodin nutzt \u201ealte\u201c Sicherheitsl\u00fccke in Windows und ben\u00f6tigt keine User-Interaktion!<\/p>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8220;Text Beitrag&#8220; _builder_version=&#8220;3.24.1&#8243; text_font=&#8220;|300|||||||&#8220; text_text_color=&#8220;#000000&#8243; z_index_tablet=&#8220;500&#8243; text_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; text_text_shadow_vertical_length_tablet=&#8220;0px&#8220; text_text_shadow_blur_strength_tablet=&#8220;1px&#8220; link_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; link_text_shadow_vertical_length_tablet=&#8220;0px&#8220; link_text_shadow_blur_strength_tablet=&#8220;1px&#8220; ul_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; ul_text_shadow_vertical_length_tablet=&#8220;0px&#8220; ul_text_shadow_blur_strength_tablet=&#8220;1px&#8220; ol_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; ol_text_shadow_vertical_length_tablet=&#8220;0px&#8220; ol_text_shadow_blur_strength_tablet=&#8220;1px&#8220; quote_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; quote_text_shadow_vertical_length_tablet=&#8220;0px&#8220; quote_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_2_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_2_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_2_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_3_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_3_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_3_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_4_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_4_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_4_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_5_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_5_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_5_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_6_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_6_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_6_text_shadow_blur_strength_tablet=&#8220;1px&#8220; box_shadow_horizontal_tablet=&#8220;0px&#8220; box_shadow_vertical_tablet=&#8220;0px&#8220; box_shadow_blur_tablet=&#8220;40px&#8220; box_shadow_spread_tablet=&#8220;0px&#8220;]<strong>Unglaublich aber wahr:<\/strong><\/p>\n<h3>Sodin wird als Exploit Baukasten \u00fcber ein \u201ePartnerprogramm\u201c verbreitet.<\/h3>\n<p>Die Entwickler haben den Code so gestaltet, dass sie bestimmen k\u00f6nnen wie die Ransomware verbreitet wird und auch die M\u00f6glichkeit integriert, entsprechende \u201eMalware-Distributoren\u201c explizit ein- bzw. auszuschlie\u00dfen. Zus\u00e4tzlich k\u00f6nnen die Entwickler durch einen Hauptschl\u00fcssel verschl\u00fcsselte Daten von Opfern selektiv entschl\u00fcsseln ohne, dass dies von Betroffenen oder Partnern bemerkt werden kann.<\/p>\n<p>Die Ransomware Sodin macht sich die bereits in 2018 entdeckte Schwachstelle CVE-2018-8453 in Microsoft Windows zu Nutze und erweitert dadurch seine Berechtigungen auf den betroffenen Systemen. In der Folge nutzt Sodin die Architektur Central Processing Unit (CPU) und die \u201eHeaven\u2019s Gate\u201c Technik um seine Erkennung zu vermeiden. Neu ist, dass zur Installation keine Aktion der User, also z.B. das \u00d6ffnen von Dateien oder Anklicken eines Links erforderlich ist.<\/p>\n<p>Die Anf\u00e4lligkeit wurde bereits im August 2018 von Kaspersky an Microsoft gemeldet und im Oktober durch einen Sicherheitspatch von Microsoft geschlossen. Laut Kaspersky ist der Exploit Code \u201evon hoher Qualit\u00e4t\u201c und so geschrieben dass er bei sehr vielen Windows Builds einschlie\u00dflich Windows 10 RS4 funktioniert. Zun\u00e4chst sind nur Angriffe im asiatischen Raum entdeckt worden. Seit kurzem treibt die Ransomware aber auch in Europa Ihr Unwesen.[\/et_pb_text][et_pb_divider color=&#8220;#939393&#8243; divider_position=&#8220;center&#8220; _builder_version=&#8220;3.24.1&#8243;][\/et_pb_divider][\/et_pb_column_inner][\/et_pb_row_inner][\/et_pb_column][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; specialty=&#8220;on&#8220; custom_css_main_1=&#8220;max-width:15%&#8220; _builder_version=&#8220;3.22.3&#8243; custom_padding=&#8220;0|0px|0|0px|false|false&#8220; custom_css_main_element=&#8220;background-color: #efefef&#8220;][et_pb_column type=&#8220;1_4&#8243; _builder_version=&#8220;3.0.47&#8243;][et_pb_image src=&#8220;https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2018\/12\/fazit.svg&#8220; align_tablet=&#8220;center&#8220; align_last_edited=&#8220;on|desktop&#8220; disabled_on=&#8220;on|on|&#8220; admin_label=&#8220;Bild Fazit&#8220; _builder_version=&#8220;3.23&#8243; max_width=&#8220;35%&#8220; module_alignment=&#8220;right&#8220; saved_tabs=&#8220;all&#8220; locked=&#8220;off&#8220;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8220;3_4&#8243; specialty_columns=&#8220;3&#8243; _builder_version=&#8220;3.0.47&#8243;][et_pb_row_inner admin_label=&#8220;Zeile&#8220; _builder_version=&#8220;3.22.7&#8243;][et_pb_column_inner type=&#8220;4_4&#8243; saved_specialty_column_type=&#8220;3_4&#8243; _builder_version=&#8220;3.0.47&#8243;][et_pb_text admin_label=&#8220;Text FAZIT&#8220; _builder_version=&#8220;3.24.1&#8243; z_index_tablet=&#8220;500&#8243; box_shadow_horizontal_tablet=&#8220;0px&#8220; box_shadow_vertical_tablet=&#8220;0px&#8220; box_shadow_blur_tablet=&#8220;40px&#8220; box_shadow_spread_tablet=&#8220;0px&#8220;]<\/p>\n<p><strong>FAZIT:<\/strong> Wir empfehlen die installierten Betriebssysteme und Applikationen regelm\u00e4\u00dfig durch <a href=\"https:\/\/www.prosoft.de\/loesungen\/software\/patch-management\/\" target=\"_blank\" rel=\"noopener noreferrer\">Patch-Management<\/a> zu aktualisieren. In diesem Fall gibt es einen Patch gegen CVE-2018-8453 bereits seit Oktober 2018. Au\u00dferdem muss eine entsprechende Anti-Malware bzw. Endpoint-Security L\u00f6sung installiert und up-to-date sein.<\/p>\n<p><strong>Links zum Beitrag:<\/strong><br \/><a href=\"https:\/\/portal.msrc.microsoft.com\/de-de\/security-guidance\/advisory\/CVE-2018-8453\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Hinweis zu CVE-2018-8453<\/a><br \/><a href=\"https:\/\/securelist.com\/sodin-ransomware\/91473\/\" target=\"_blank\" rel=\"noopener noreferrer\">Kaspersky Hinweis zu Sodin Ransomware<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column_inner][\/et_pb_row_inner][\/et_pb_column][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; admin_label=&#8220;Auto und Beitragsnavi&#8220; _builder_version=&#8220;3.19.17&#8243; custom_padding=&#8220;0|0px|2px|0px|false|false&#8220; global_module=&#8220;2039&#8243;][et_pb_row custom_padding=&#8220;24px|0px|35px|0px|false|false&#8220; _builder_version=&#8220;3.22.3&#8243; background_size=&#8220;initial&#8220; background_position=&#8220;top_left&#8220; background_repeat=&#8220;repeat&#8220; max_width=&#8220;1080px&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;3.0.47&#8243;][et_pb_image src=&#8220;https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2019\/02\/red-nachtigall.png&#8220; align=&#8220;center&#8220; align_tablet=&#8220;center&#8220; align_last_edited=&#8220;on|desktop&#8220; admin_label=&#8220;Bild Nachtigall&#8220; _builder_version=&#8220;3.23&#8243; z_index_tablet=&#8220;500&#8243; custom_css_main_element=&#8220;max-width:100px;;&#8220;][\/et_pb_image][et_pb_text admin_label=&#8220;Text Willy Nachtigall&#8220; _builder_version=&#8220;3.22.7&#8243; text_orientation=&#8220;center&#8220; z_index_tablet=&#8220;500&#8243;]<\/p>\n<p><a href=\"mailto:Redaktion@prosoft.de\"><em><strong>Willy Nachtigall<\/strong><\/em><\/a><\/p>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8220;Beschreibung Willy Nachtigall&#8220; _builder_version=&#8220;3.22.7&#8243; text_font_size=&#8220;12px&#8220; text_line_height=&#8220;1.2em&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;-10px||&#8220;]<\/p>\n<p style=\"text-align: center;\">Redakteur und Technischer Support Manager<\/p>\n<p>[\/et_pb_text][et_pb_divider color=&#8220;#009ee2&#8243; divider_weight=&#8220;5px&#8220; _builder_version=&#8220;3.23.4&#8243; max_width=&#8220;20%&#8220; module_alignment=&#8220;center&#8220; height=&#8220;0px&#8220;][\/et_pb_divider][et_pb_post_nav in_same_term=&#8220;off&#8220; prev_text=&#8220;Vorheriger Beitrag&#8220; next_text=&#8220;N\u00e4chster Beitrag&#8220; admin_label=&#8220;Beitragsnavigation&#8220; _builder_version=&#8220;3.22.7&#8243; title_font=&#8220;||||||||&#8220; title_text_color=&#8220;#009ee2&#8243;][\/et_pb_post_nav][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; disabled_on=&#8220;|on|off&#8220; admin_label=&#8220;Section Newsletter Anmeldung&#8220; module_id=&#8220;newsletter&#8220; _builder_version=&#8220;3.19.17&#8243; background_color=&#8220;#002b54&#8243; custom_padding=&#8220;0|0px|0|0px|false|false&#8220; global_module=&#8220;433&#8243;][et_pb_row custom_padding=&#8220;24px|0px|0|0px|false|false&#8220; _builder_version=&#8220;3.24&#8243; max_width=&#8220;1080px&#8220; animation_direction=&#8220;left&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;3.0.47&#8243;][et_pb_image src=&#8220;https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2019\/02\/pro_blog_newsletter-2.svg&#8220; align=&#8220;center&#8220; align_tablet=&#8220;center&#8220; align_last_edited=&#8220;on|desktop&#8220; admin_label=&#8220;Bild Icon Newsletter&#8220; _builder_version=&#8220;3.23&#8243; max_width=&#8220;150px&#8220; animation_style=&#8220;slide&#8220; animation_direction=&#8220;top&#8220;][\/et_pb_image][et_pb_text admin_label=&#8220;Der ProBlog Newsletter&#8220; _builder_version=&#8220;3.19.15&#8243; text_font=&#8220;|300|||||||&#8220; text_font_size=&#8220;14px&#8220; text_line_height=&#8220;1.3em&#8220; background_layout=&#8220;dark&#8220; custom_padding=&#8220;||0px&#8220; animation_direction=&#8220;left&#8220;]<\/p>\n<h1 style=\"text-align: center;\">Der ProBlog Newsletter<\/h1>\n<h5 style=\"text-align: center;\">Bleiben Sie auf dem Laufenden mit unseren interessanten News, Updates und Insights<br \/>zu modernen IT-Security &amp; IT-Infrastruktur-L\u00f6sungen.<\/h5>\n<p style=\"text-align: center;\">Members Only: <br \/>Alle Newsletter-Empf\u00e4nger erhalten jetzt Zugriff auf exklusive Inhalte!<\/p>\n<p style=\"text-align: center;\">Bitte f\u00fcllen Sie kurz das Formular aus.<br \/>Anschlie\u00dfend erhalten Sie eine E-Mail, mit der Sie Ihre Anmeldung best\u00e4tigen k\u00f6nnen.<\/p>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8220;Anmeldeformular Newsletter&#8220; _builder_version=&#8220;3.19.15&#8243; text_font_size=&#8220;12px&#8220; text_orientation=&#8220;center&#8220; background_layout=&#8220;dark&#8220; custom_margin=&#8220;-50px||&#8220; animation_style=&#8220;fade&#8220; animation_direction=&#8220;bottom&#8220;]<\/p>\n<p>\u00a0<\/p>\n<p>[newsletter_form button_label=&#8220;Jetzt anmelden&#8220;]\u00a0 [newsletter_field name=&#8220;surname&#8220; placeholder=&#8220;Firma&#8220; label=&#8220;&#8220;] [newsletter_field name=&#8220;first_name&#8220;\u00a0 placeholder=&#8220;Name&#8220; label=&#8220;&#8220;] [newsletter_field name=&#8220;email&#8220; placeholder=&#8220;Email&#8220; label=&#8220;&#8220;] Mit der Anmeldung akzeptiere ich die <a href=\"https:\/\/www.prosoft.de\/datenschutzerklaerung\/\" target=\"_blank\" rel=\"noopener noreferrer\">Datenschutzbestimmungen<\/a> der ProSoft GmbH.<br \/>[\/newsletter_form]<\/p>\n<p>\u00a0<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;3.22.3&#8243; background_color=&#8220;#a7b7c7&#8243; custom_padding=&#8220;0|0px|0|0px|false|false&#8220; global_module=&#8220;179&#8243;][et_pb_row custom_padding=&#8220;24px|0px|40px|0px|false|false&#8220; _builder_version=&#8220;3.22.3&#8243; background_size=&#8220;initial&#8220; background_position=&#8220;top_left&#8220; background_repeat=&#8220;repeat&#8220;][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;3.0.47&#8243;][et_pb_text admin_label=&#8220;Der ProBlog&#8220; _builder_version=&#8220;3.24&#8243; background_layout=&#8220;dark&#8220;]<\/p>\n<h3>Der ProBlog<\/h3>\n<p>[\/et_pb_text][et_pb_divider color=&#8220;#ffffff&#8220; _builder_version=&#8220;3.19.4&#8243; height=&#8220;10px&#8220; custom_margin=&#8220;-10px||&#8220;][\/et_pb_divider][et_pb_text admin_label=&#8220;ist ein Angebot der&#8220; _builder_version=&#8220;3.19.4&#8243; text_font_size=&#8220;12px&#8220; text_line_height=&#8220;1.2em&#8220; background_layout=&#8220;dark&#8220;]<\/p>\n<p>ist ein Angebot der<\/p>\n<p>ProSoft GmbH<br \/>B\u00fcrgermeister-Graf-Ring 10<br \/>82538 Geretsried<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][et_pb_social_media_follow _builder_version=&#8220;3.19.16&#8243; custom_margin=&#8220;|0px||&#8220; custom_padding=&#8220;|0px||0px&#8220; locked=&#8220;off&#8220;][et_pb_social_media_follow_network social_network=&#8220;facebook&#8220; url=&#8220;https:\/\/www.facebook.com\/prosoft.de\/&#8220; _builder_version=&#8220;3.19.5&#8243; background_color=&#8220;#3b5998&#8243; follow_button=&#8220;off&#8220; url_new_window=&#8220;on&#8220;]Facebook[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=&#8220;twitter&#8220; url=&#8220;https:\/\/twitter.com\/prosoft_de\/&#8220; _builder_version=&#8220;3.19.5&#8243; background_color=&#8220;#00aced&#8220; follow_button=&#8220;off&#8220; url_new_window=&#8220;on&#8220;]twitter[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=&#8220;youtube&#8220; url=&#8220;https:\/\/www.youtube.com\/user\/Prosoft&#8220; _builder_version=&#8220;3.19.5&#8243; background_color=&#8220;#a82400&#8243; follow_button=&#8220;off&#8220; url_new_window=&#8220;on&#8220;]youtube[\/et_pb_social_media_follow_network][\/et_pb_social_media_follow][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;3.0.47&#8243;][et_pb_text admin_label=&#8220;Kontakt&#8220; _builder_version=&#8220;3.19.4&#8243; background_layout=&#8220;dark&#8220;]<\/p>\n<h3>Kontakt und Support<\/h3>\n<p>[\/et_pb_text][et_pb_divider color=&#8220;#ffffff&#8220; _builder_version=&#8220;3.19.4&#8243; height=&#8220;10px&#8220; custom_margin=&#8220;-10px||&#8220;][\/et_pb_divider][et_pb_text admin_label=&#8220;Telefon +49 (0) 8171\/405-0&#8243; _builder_version=&#8220;3.24&#8243; text_font_size=&#8220;12px&#8220; text_line_height=&#8220;1.2em&#8220; background_layout=&#8220;dark&#8220;]<\/p>\n<p>Telefon +49 (0) 8171\/405-0<br \/>Fax\u00a0 + 49 (0) 8171\/405-400<br \/><span style=\"color: rgba(255, 255, 255, 0);\"><a style=\"color: rgba(255, 255, 255, 0);\" href=\"mailto:info@prosoft.de\"><span style=\"color: #ffffff;\">info@prosoft.de<\/span> <\/a><\/span><\/p>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8220;Links ProSoft&#8220; _builder_version=&#8220;3.19.16&#8243; text_font_size=&#8220;12px&#8220; text_line_height=&#8220;1.2em&#8220; background_layout=&#8220;dark&#8220;]<\/p>\n<p><span style=\"color: #ffffff;\"><a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/\" target=\"_blank\" rel=\"noopener noreferrer\">\u279d ProSoft Webseite<\/a><br \/><a style=\"color: #ffffff;\" href=\"https:\/\/shop.prosoft.de\/\" target=\"_blank\" rel=\"noopener noreferrer\">\u279d ProSoft Shop<\/a><br \/><a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/faq\/\" target=\"_blank\" rel=\"noopener noreferrer\">\u279d ProSoft FAQ<\/a><\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;3.0.47&#8243;][et_pb_text admin_label=&#8220;Sitemap &#038; Links&#8220; _builder_version=&#8220;3.19.16&#8243; background_layout=&#8220;dark&#8220;]<\/p>\n<h3>Mehr dazu<\/h3>\n<p>[\/et_pb_text][et_pb_divider color=&#8220;#ffffff&#8220; _builder_version=&#8220;3.19.4&#8243; height=&#8220;10px&#8220; custom_margin=&#8220;-10px||&#8220;][\/et_pb_divider][et_pb_text admin_label=&#8220;Links Impressum etc&#8220; _builder_version=&#8220;3.19.16&#8243; text_font_size=&#8220;12px&#8220; text_line_height=&#8220;1.2em&#8220; background_layout=&#8220;dark&#8220;]<\/p>\n<p><span style=\"color: #ffffff;\">\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/blog\/impressum\/\">Impressum<\/a><a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/impressum\/\"><br \/><\/a>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/datenschutzerklaerung\/\">Datenschutz<\/a><br \/><a style=\"color: #ffffff;\" href=\"\/die-redaktion\/\"><span style=\"color: #ffffff;\">\u279d<\/span> Redaktion<\/a><br \/><a style=\"color: #ffffff;\" href=\"\/ueber-uns-prosoft\/\">\u279d \u00dcber uns<\/a><\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sodin: Erste \u201esich-selbst-installierende\u201c Ransomware!<br \/>\nDie neue Bedrohung nutzt \u201ealte\u201c Sicherheitsl\u00fccke in Windows und ben\u00f6tigt keine User-Interaktion!<\/p>\n","protected":false},"author":7,"featured_media":2765,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[58,69,56,576],"tags":[84,47,53,85],"class_list":["post-2761","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-security-im-prosoft-blog","category-malware","category-patch-verwaltung","category-schwachstellen","tag-cve-2018-8453","tag-patch-management","tag-ransomware","tag-windows-sicherheitsluecke"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Ransomware-as-a Service - ProSoft Blog<\/title>\n<meta name=\"description\" content=\"Sodin Ransomware-as-a-Service \u2013 installiert sich ohne Anwender Interaktion und nutzt Windows Sicherheitsl\u00fccke aus 2018 \u2013 ProBlog IT-Security\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.prosoft.de\/blog\/ransomware-as-a-service\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware-as-a Service: Sodin\" \/>\n<meta property=\"og:description\" content=\"Die neue Ransomware nutzt \u201ealte\u201c Sicherheitsl\u00fccke in Windows und ben\u00f6tigt keine User-Interaktion!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.prosoft.de\/blog\/ransomware-as-a-service\/\" \/>\n<meta property=\"og:site_name\" content=\"ProSoft Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-04T11:58:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-25T10:35:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2019\/07\/ransomew.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"504\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Robert Korherr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Patch Tuesday Mai 2019\" \/>\n<meta name=\"twitter:description\" content=\"Informationen zum aktuellen Patchday\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2018\/12\/h-patchday-01-2019.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@prosoft_de\" \/>\n<meta name=\"twitter:site\" content=\"@prosoft_de\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Robert Korherr\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"12\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/ransomware-as-a-service\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/ransomware-as-a-service\\\/\"},\"author\":{\"name\":\"Robert Korherr\",\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/#\\\/schema\\\/person\\\/ceb0d9eb1290da52ff802aaf2231d811\"},\"headline\":\"Ransomware-as-a Service\",\"datePublished\":\"2019-07-04T11:58:38+00:00\",\"dateModified\":\"2025-09-25T10:35:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/ransomware-as-a-service\\\/\"},\"wordCount\":2379,\"publisher\":{\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/ransomware-as-a-service\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/ransomew.jpg\",\"keywords\":[\"CVE-2018-8453\",\"Patch-Management\",\"Ransomware\",\"Windows Sicherheitsl\u00fccke\"],\"articleSection\":[\"IT-Security\",\"Malware\",\"Patch-Verwaltung\",\"Schwachstellen\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/ransomware-as-a-service\\\/\",\"url\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/ransomware-as-a-service\\\/\",\"name\":\"Ransomware-as-a Service - ProSoft Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/ransomware-as-a-service\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/ransomware-as-a-service\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/ransomew.jpg\",\"datePublished\":\"2019-07-04T11:58:38+00:00\",\"dateModified\":\"2025-09-25T10:35:44+00:00\",\"description\":\"Sodin Ransomware-as-a-Service \u2013 installiert sich ohne Anwender Interaktion und nutzt Windows Sicherheitsl\u00fccke aus 2018 \u2013 ProBlog IT-Security\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/ransomware-as-a-service\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/ransomware-as-a-service\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/ransomware-as-a-service\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/ransomew.jpg\",\"contentUrl\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/ransomew.jpg\",\"width\":800,\"height\":504,\"caption\":\"Ransomeware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/ransomware-as-a-service\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware-as-a Service\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/\",\"name\":\"ProSoft Blog\",\"description\":\"ProSoft GmbH | Manage, Secure, Optimise IT\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/#organization\",\"name\":\"ProSoft Blog\",\"url\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Logo-schwarz-orange-slogan.jpg\",\"contentUrl\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Logo-schwarz-orange-slogan.jpg\",\"width\":1200,\"height\":344,\"caption\":\"ProSoft Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/prosoft_de\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/prosoft-security-gmbh\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/Prosoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/#\\\/schema\\\/person\\\/ceb0d9eb1290da52ff802aaf2231d811\",\"name\":\"Robert Korherr\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e900784c694475c7a8f5cdce3dd3798a7f7fbfb92c18987ad95eeaf920cdc59b?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e900784c694475c7a8f5cdce3dd3798a7f7fbfb92c18987ad95eeaf920cdc59b?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e900784c694475c7a8f5cdce3dd3798a7f7fbfb92c18987ad95eeaf920cdc59b?s=96&d=blank&r=g\",\"caption\":\"Robert Korherr\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/robertkorherr\\\/\"],\"url\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/author\\\/robert-korherrprosoft-de\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Ransomware-as-a Service - ProSoft Blog","description":"Sodin Ransomware-as-a-Service \u2013 installiert sich ohne Anwender Interaktion und nutzt Windows Sicherheitsl\u00fccke aus 2018 \u2013 ProBlog IT-Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.prosoft.de\/blog\/ransomware-as-a-service\/","og_locale":"de_DE","og_type":"article","og_title":"Ransomware-as-a Service: Sodin","og_description":"Die neue Ransomware nutzt \u201ealte\u201c Sicherheitsl\u00fccke in Windows und ben\u00f6tigt keine User-Interaktion!","og_url":"https:\/\/www.prosoft.de\/blog\/ransomware-as-a-service\/","og_site_name":"ProSoft Blog","article_published_time":"2019-07-04T11:58:38+00:00","article_modified_time":"2025-09-25T10:35:44+00:00","og_image":[{"width":800,"height":504,"url":"https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2019\/07\/ransomew.jpg","type":"image\/jpeg"}],"author":"Robert Korherr","twitter_card":"summary_large_image","twitter_title":"Patch Tuesday Mai 2019","twitter_description":"Informationen zum aktuellen Patchday","twitter_image":"https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2018\/12\/h-patchday-01-2019.jpg","twitter_creator":"@prosoft_de","twitter_site":"@prosoft_de","twitter_misc":{"Verfasst von":"Robert Korherr","Gesch\u00e4tzte Lesezeit":"12\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.prosoft.de\/blog\/ransomware-as-a-service\/#article","isPartOf":{"@id":"https:\/\/www.prosoft.de\/blog\/ransomware-as-a-service\/"},"author":{"name":"Robert Korherr","@id":"https:\/\/www.prosoft.de\/blog\/#\/schema\/person\/ceb0d9eb1290da52ff802aaf2231d811"},"headline":"Ransomware-as-a Service","datePublished":"2019-07-04T11:58:38+00:00","dateModified":"2025-09-25T10:35:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.prosoft.de\/blog\/ransomware-as-a-service\/"},"wordCount":2379,"publisher":{"@id":"https:\/\/www.prosoft.de\/blog\/#organization"},"image":{"@id":"https:\/\/www.prosoft.de\/blog\/ransomware-as-a-service\/#primaryimage"},"thumbnailUrl":"https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2019\/07\/ransomew.jpg","keywords":["CVE-2018-8453","Patch-Management","Ransomware","Windows Sicherheitsl\u00fccke"],"articleSection":["IT-Security","Malware","Patch-Verwaltung","Schwachstellen"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.prosoft.de\/blog\/ransomware-as-a-service\/","url":"https:\/\/www.prosoft.de\/blog\/ransomware-as-a-service\/","name":"Ransomware-as-a Service - ProSoft Blog","isPartOf":{"@id":"https:\/\/www.prosoft.de\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.prosoft.de\/blog\/ransomware-as-a-service\/#primaryimage"},"image":{"@id":"https:\/\/www.prosoft.de\/blog\/ransomware-as-a-service\/#primaryimage"},"thumbnailUrl":"https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2019\/07\/ransomew.jpg","datePublished":"2019-07-04T11:58:38+00:00","dateModified":"2025-09-25T10:35:44+00:00","description":"Sodin Ransomware-as-a-Service \u2013 installiert sich ohne Anwender Interaktion und nutzt Windows Sicherheitsl\u00fccke aus 2018 \u2013 ProBlog IT-Security","breadcrumb":{"@id":"https:\/\/www.prosoft.de\/blog\/ransomware-as-a-service\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.prosoft.de\/blog\/ransomware-as-a-service\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.prosoft.de\/blog\/ransomware-as-a-service\/#primaryimage","url":"https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2019\/07\/ransomew.jpg","contentUrl":"https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2019\/07\/ransomew.jpg","width":800,"height":504,"caption":"Ransomeware"},{"@type":"BreadcrumbList","@id":"https:\/\/www.prosoft.de\/blog\/ransomware-as-a-service\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.prosoft.de\/blog\/"},{"@type":"ListItem","position":2,"name":"Ransomware-as-a Service"}]},{"@type":"WebSite","@id":"https:\/\/www.prosoft.de\/blog\/#website","url":"https:\/\/www.prosoft.de\/blog\/","name":"ProSoft Blog","description":"ProSoft GmbH | Manage, Secure, Optimise IT","publisher":{"@id":"https:\/\/www.prosoft.de\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.prosoft.de\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.prosoft.de\/blog\/#organization","name":"ProSoft Blog","url":"https:\/\/www.prosoft.de\/blog\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.prosoft.de\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2023\/10\/Logo-schwarz-orange-slogan.jpg","contentUrl":"https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2023\/10\/Logo-schwarz-orange-slogan.jpg","width":1200,"height":344,"caption":"ProSoft Blog"},"image":{"@id":"https:\/\/www.prosoft.de\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/prosoft_de","https:\/\/www.linkedin.com\/company\/prosoft-security-gmbh\/","https:\/\/www.youtube.com\/user\/Prosoft"]},{"@type":"Person","@id":"https:\/\/www.prosoft.de\/blog\/#\/schema\/person\/ceb0d9eb1290da52ff802aaf2231d811","name":"Robert Korherr","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/e900784c694475c7a8f5cdce3dd3798a7f7fbfb92c18987ad95eeaf920cdc59b?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e900784c694475c7a8f5cdce3dd3798a7f7fbfb92c18987ad95eeaf920cdc59b?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e900784c694475c7a8f5cdce3dd3798a7f7fbfb92c18987ad95eeaf920cdc59b?s=96&d=blank&r=g","caption":"Robert Korherr"},"sameAs":["https:\/\/www.linkedin.com\/in\/robertkorherr\/"],"url":"https:\/\/www.prosoft.de\/blog\/author\/robert-korherrprosoft-de\/"}]}},"_links":{"self":[{"href":"https:\/\/www.prosoft.de\/blog\/wp-json\/wp\/v2\/posts\/2761","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.prosoft.de\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.prosoft.de\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.prosoft.de\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.prosoft.de\/blog\/wp-json\/wp\/v2\/comments?post=2761"}],"version-history":[{"count":2,"href":"https:\/\/www.prosoft.de\/blog\/wp-json\/wp\/v2\/posts\/2761\/revisions"}],"predecessor-version":[{"id":49302,"href":"https:\/\/www.prosoft.de\/blog\/wp-json\/wp\/v2\/posts\/2761\/revisions\/49302"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.prosoft.de\/blog\/wp-json\/wp\/v2\/media\/2765"}],"wp:attachment":[{"href":"https:\/\/www.prosoft.de\/blog\/wp-json\/wp\/v2\/media?parent=2761"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.prosoft.de\/blog\/wp-json\/wp\/v2\/categories?post=2761"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.prosoft.de\/blog\/wp-json\/wp\/v2\/tags?post=2761"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}