{"id":7041,"date":"2014-05-14T13:24:31","date_gmt":"2014-05-14T13:24:31","guid":{"rendered":"http:\/\/www.bsk-consulting.de\/?p=860"},"modified":"2022-03-25T14:12:04","modified_gmt":"2022-03-25T13:12:04","slug":"trojaner-warnung-telekom-e-mail-betreff-rechnungonline-monat-mai-2014-buchungskonto-2962325641","status":"publish","type":"post","link":"https:\/\/www.nextron-systems.com\/2014\/05\/14\/trojaner-warnung-telekom-e-mail-betreff-rechnungonline-monat-mai-2014-buchungskonto-2962325641\/","title":{"rendered":"Trojaner Warnung: Telekom E-Mail Betreff: RechnungOnline Monat Mai 2014, Buchungskonto: 2962325641"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;3.22&#8243;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.4.3&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;]<div id=\"attachment_861\" style=\"width: 602px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-861\" class=\"size-full wp-image-861\" src=\"\/wp-content\/uploads\/2014\/05\/ishot-140514-152024.png\" alt=\"Telekom E-Mail mit dem Betreff: RechnungOnline Monat Mai 2014\" width=\"592\" height=\"413\" \/><p id=\"caption-attachment-861\" class=\"wp-caption-text\">Telekom E-Mail mit dem Betreff: RechnungOnline Monat Mai 2014<\/p><\/div><br \/>\nEs tobt derzeit wieder eine neue Phishing Welle.<br \/>\nZahlreiche Mails mit Telekom Rechnungen oder Vodafone Rechnung (EXE in ZIP) werden derzeit in haupts\u00e4chliche deutsche Postf\u00e4cher geliefert. Betreff ist &#8220;Telekom E-Mail mit dem Betreff: RechnungOnline Monat Mai 2014, Buchungskonto: 2962325641&#8221; oder &#8220;Ihre Rechnung vom 14.05.2014 steht als PDF bereit&#8221;.<br \/>\nErkennungsrate liegt wieder einmal unter 5%.<br \/>\nDie Strings im File sehen stark nach \u201cCridex&#8221; aus, den ich Mitte Januar bereits analysiert habe.<br \/>\nDas sind die derzeitigen Indikatoren of Compromise (IoCs):<br \/>\nC2 Domains<br \/>\n===================<br \/>\nflusegame.eu<br \/>\nflusegames.eu<br \/>\nhumpackers.org<br \/>\ninteryou.pw<br \/>\n162.220.246.105 (US)<br \/>\n195.168.1.121 (Slowakei)<br \/>\n&gt; brauchbar<br \/>\nUSER AGENT<br \/>\n===================<br \/>\nUser-Agent: Mozilla\/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident\/5.0)<br \/>\n\u008b&gt; unbrauchbar<br \/>\n<a href=\"http:\/\/blogs.msdn.com\/b\/ie\/archive\/2010\/03\/23\/introducing-ie9-s-user-agent-string.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/blogs.msdn.com\/b\/ie\/archive\/2010\/03\/23\/introducing-ie9-s-user-agent-string.aspx<\/a><br \/>\nURL Request<br \/>\n===================<br \/>\nPOST \/70144646\/974aade0\/ HTTP\/1.1<br \/>\nPOST \/3af6d48d\/ec8a4b32\/ HTTP\/1.1<br \/>\n\u008b&gt; brauchbar<br \/>\nRegex: POST \\\/[0-9a-f]{8}\\\/[0-9a-f]{8}\\\/ HTTP\\\/1\\.1<br \/>\nFile System<br \/>\n===================<br \/>\nFiles Created<br \/>\nVM 1 XP<br \/>\nC:\\Documents and Settings\\Administrator\\Application Data\\Microsoft\\lmyaudio.exe<br \/>\n736A96BBAD59864F27F3599D88D28EA2<br \/>\nC:\\Documents and Settings\\Administrator\\Application Data\\6574676.bat<br \/>\n82E21F407E2161E350B7B90C89BFB6E4<br \/>\nWM 1 Win7<br \/>\nC:\\Users\\admin\\AppData\\Roaming\\3818398.bat<br \/>\n7815C2E3F3EC32232A8532C298E0458F<br \/>\nC:\\Users\\admin\\AppData\\Roaming\\Microsoft\\hxxshare.exe<br \/>\n736A96BBAD59864F27F3599D88D28EA2<br \/>\nVM 2<br \/>\n%UserProfile%\\APPLIC~1\\MICROS~1\\WWCCOM~1.EXE<br \/>\nVM 3<br \/>\nC:\\Documents and Settings\\User\\Application Data\\Microsoft\\rqvupdate.exe<br \/>\n736a96bbad59864f27f3599d88d28ea2<br \/>\nC:\\DOCUME~1\\User\\LOCALS~1\\Temp\\1.tmp<br \/>\nbdb072ca6b6980addcad385462379c21<br \/>\nC:\\Documents and Settings\\User\\Application Data\\1478967.bat<br \/>\ne7f01e2614ea2a1202c2c1f04f930343<br \/>\n\u008b&gt; MD5 brauchbar:<br \/>\n736a96bbad59864f27f3599d88d28ea2<br \/>\n=== Links<br \/>\nInfos<br \/>\n<a href=\"http:\/\/www.mimikama.at\/allgemein\/trojaner-warnung-telekom-e-mail-mit-dem-betreff-rechnungonline-monat-mai-2014-buchungskonto-2962325641-sic\/\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.mimikama.at\/allgemein\/trojaner-warnung-telekom-e-mail-mit-dem-betreff-rechnungonline-monat-mai-2014-buchungskonto-2962325641-sic\/<\/a><br \/>\nVirustotal Analyse ZIP<br \/>\n<a href=\"https:\/\/www.virustotal.com\/en\/file\/4f54a33986c83dd6459986c730072c8e8b82386de9f517d95d8e2136faabd781\/analysis\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.virustotal.com\/en\/file\/4f54a33986c83dd6459986c730072c8e8b82386de9f517d95d8e2136faabd781\/analysis\/<\/a><br \/>\nThreat Expert Report<br \/>\n<a href=\"http:\/\/www.threatexpert.com\/report.aspx?md5=eba99ce062c104aae07a4ed39edfe6c3\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.threatexpert.com\/report.aspx?md5=eba99ce062c104aae07a4ed39edfe6c3<\/a><br \/>\n<a href=\"http:\/\/www.threatexpert.com\/report.aspx?md5=2989f59501ae96035b8ccdf67f4d0ae0\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.threatexpert.com\/report.aspx?md5=2989f59501ae96035b8ccdf67f4d0ae0<\/a><br \/>\nAnalyse Malicious EXE<br \/>\n<a href=\"https:\/\/malwr.com\/analysis\/NTRjNzczYzVlNjE4NGI5NThlZjk4NWUzZjAyMTIyY2Q\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/malwr.com\/analysis\/NTRjNzczYzVlNjE4NGI5NThlZjk4NWUzZjAyMTIyY2Q\/<\/a><br \/>\n&nbsp;[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Es tobt derzeit wieder eine neue Phishing Welle. Zahlreiche Mails mit Telekom Rechnungen oder Vodafone Rechnung (EXE in ZIP) werden derzeit in haupts\u00e4chliche deutsche Postf\u00e4cher geliefert. Betreff ist &#8220;Telekom E-Mail mit dem Betreff: RechnungOnline Monat Mai 2014, Buchungskonto: 2962325641&#8221; oder &#8220;Ihre Rechnung vom 14.05.2014 steht als PDF bereit&#8221;. Erkennungsrate liegt wieder einmal unter 5%. Die Strings im File sehen stark nach \u201cCridex&#8221; aus, den ich Mitte Januar bereits analysiert habe. Das sind die derzeitigen Indikatoren of Compromise (IoCs): C2 Domains =================== flusegame.eu flusegames.eu humpackers.org interyou.pw 162.220.246.105 (US) 195.168.1.121 (Slowakei) &gt; brauchbar USER AGENT =================== User-Agent: Mozilla\/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident\/5.0) \u008b&gt; unbrauchbar http:\/\/blogs.msdn.com\/b\/ie\/archive\/2010\/03\/23\/introducing-ie9-s-user-agent-string.aspx URL Request =================== POST \/70144646\/974aade0\/ HTTP\/1.1 POST \/3af6d48d\/ec8a4b32\/ HTTP\/1.1 \u008b&gt; brauchbar Regex: POST \\\/[0-9a-f]{8}\\\/[0-9a-f]{8}\\\/ HTTP\\\/1\\.1 File System =================== Files Created VM 1 XP C:\\Documents and Settings\\Administrator\\Application Data\\Microsoft\\lmyaudio.exe 736A96BBAD59864F27F3599D88D28EA2 C:\\Documents and Settings\\Administrator\\Application Data\\6574676.bat 82E21F407E2161E350B7B90C89BFB6E4 WM 1 Win7 C:\\Users\\admin\\AppData\\Roaming\\3818398.bat 7815C2E3F3EC32232A8532C298E0458F C:\\Users\\admin\\AppData\\Roaming\\Microsoft\\hxxshare.exe 736A96BBAD59864F27F3599D88D28EA2 VM 2 %UserProfile%\\APPLIC~1\\MICROS~1\\WWCCOM~1.EXE VM 3 C:\\Documents and Settings\\User\\Application Data\\Microsoft\\rqvupdate.exe 736a96bbad59864f27f3599d88d28ea2 C:\\DOCUME~1\\User\\LOCALS~1\\Temp\\1.tmp bdb072ca6b6980addcad385462379c21 C:\\Documents and Settings\\User\\Application Data\\1478967.bat e7f01e2614ea2a1202c2c1f04f930343 \u008b&gt; MD5 brauchbar: 736a96bbad59864f27f3599d88d28ea2 === Links Infos http:\/\/www.mimikama.at\/allgemein\/trojaner-warnung-telekom-e-mail-mit-dem-betreff-rechnungonline-monat-mai-2014-buchungskonto-2962325641-sic\/ Virustotal Analyse ZIP https:\/\/www.virustotal.com\/en\/file\/4f54a33986c83dd6459986c730072c8e8b82386de9f517d95d8e2136faabd781\/analysis\/ Threat Expert Report http:\/\/www.threatexpert.com\/report.aspx?md5=eba99ce062c104aae07a4ed39edfe6c3 http:\/\/www.threatexpert.com\/report.aspx?md5=2989f59501ae96035b8ccdf67f4d0ae0 Analyse Malicious EXE https:\/\/malwr.com\/analysis\/NTRjNzczYzVlNjE4NGI5NThlZjk4NWUzZjAyMTIyY2Q\/ &nbsp;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"[caption id=\"attachment_861\" align=\"alignnone\" width=\"592\"]<img class=\"size-full wp-image-861\" src=\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2014\/05\/ishot-140514-152024.png\" alt=\"Telekom E-Mail mit dem Betreff: RechnungOnline Monat Mai 2014\" width=\"592\" height=\"413\" \/> Telekom E-Mail mit dem Betreff: RechnungOnline Monat Mai 2014[\/caption]\r\nEs tobt derzeit wieder eine neue Phishing Welle.\r\nZahlreiche Mails mit Telekom Rechnungen oder Vodafone Rechnung (EXE in ZIP) werden derzeit in haupts\u00e4chliche deutsche Postf\u00e4cher geliefert. Betreff ist \"Telekom E-Mail mit dem Betreff: RechnungOnline Monat Mai 2014, Buchungskonto: 2962325641\" oder \"Ihre Rechnung vom 14.05.2014 steht als PDF bereit\".\r\nErkennungsrate liegt wieder einmal unter 5%.\r\nDie Strings im File sehen stark nach \u201cCridex\" aus, den ich Mitte Januar bereits analysiert habe.\r\nDas sind die derzeitigen Indikatoren of Compromise (IoCs):\r\nC2 Domains\r\n===================\r\nflusegame.eu\r\nflusegames.eu\r\nhumpackers.org\r\ninteryou.pw\r\n162.220.246.105 (US)\r\n195.168.1.121 (Slowakei)\r\n> brauchbar\r\nUSER AGENT\r\n===================\r\nUser-Agent: Mozilla\/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident\/5.0)\r\n\u008b> unbrauchbar\r\n<a href=\"http:\/\/blogs.msdn.com\/b\/ie\/archive\/2010\/03\/23\/introducing-ie9-s-user-agent-string.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/blogs.msdn.com\/b\/ie\/archive\/2010\/03\/23\/introducing-ie9-s-user-agent-string.aspx<\/a>\r\nURL Request\r\n===================\r\nPOST \/70144646\/974aade0\/ HTTP\/1.1\r\nPOST \/3af6d48d\/ec8a4b32\/ HTTP\/1.1\r\n\u008b> brauchbar\r\nRegex: POST \/[0-9a-f]{8}\/[0-9a-f]{8}\/ HTTP\/1.1\r\nFile System\r\n===================\r\nFiles Created\r\nVM 1 XP\r\nC:Documents and SettingsAdministratorApplication DataMicrosoftlmyaudio.exe\r\n736A96BBAD59864F27F3599D88D28EA2\r\nC:Documents and SettingsAdministratorApplication Data6574676.bat\r\n82E21F407E2161E350B7B90C89BFB6E4\r\nWM 1 Win7\r\nC:UsersadminAppDataRoaming3818398.bat\r\n7815C2E3F3EC32232A8532C298E0458F\r\nC:UsersadminAppDataRoamingMicrosofthxxshare.exe\r\n736A96BBAD59864F27F3599D88D28EA2\r\nVM 2\r\n%UserProfile%APPLIC~1MICROS~1WWCCOM~1.EXE\r\nVM 3\r\nC:Documents and SettingsUserApplication DataMicrosoftrqvupdate.exe\r\n736a96bbad59864f27f3599d88d28ea2\r\nC:DOCUME~1UserLOCALS~1Temp1.tmp\r\nbdb072ca6b6980addcad385462379c21\r\nC:Documents and SettingsUserApplication Data1478967.bat\r\ne7f01e2614ea2a1202c2c1f04f930343\r\n\u008b> MD5 brauchbar:\r\n736a96bbad59864f27f3599d88d28ea2\r\n=== Links\r\nInfos\r\n<a href=\"http:\/\/www.mimikama.at\/allgemein\/trojaner-warnung-telekom-e-mail-mit-dem-betreff-rechnungonline-monat-mai-2014-buchungskonto-2962325641-sic\/\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.mimikama.at\/allgemein\/trojaner-warnung-telekom-e-mail-mit-dem-betreff-rechnungonline-monat-mai-2014-buchungskonto-2962325641-sic\/<\/a>\r\nVirustotal Analyse ZIP\r\n<a href=\"https:\/\/www.virustotal.com\/en\/file\/4f54a33986c83dd6459986c730072c8e8b82386de9f517d95d8e2136faabd781\/analysis\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.virustotal.com\/en\/file\/4f54a33986c83dd6459986c730072c8e8b82386de9f517d95d8e2136faabd781\/analysis\/<\/a>\r\nThreat Expert Report\r\n<a href=\"http:\/\/www.threatexpert.com\/report.aspx?md5=eba99ce062c104aae07a4ed39edfe6c3\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.threatexpert.com\/report.aspx?md5=eba99ce062c104aae07a4ed39edfe6c3<\/a>\r\n<a href=\"http:\/\/www.threatexpert.com\/report.aspx?md5=2989f59501ae96035b8ccdf67f4d0ae0\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.threatexpert.com\/report.aspx?md5=2989f59501ae96035b8ccdf67f4d0ae0<\/a>\r\nAnalyse Malicious EXE\r\n<a href=\"https:\/\/malwr.com\/analysis\/NTRjNzczYzVlNjE4NGI5NThlZjk4NWUzZjAyMTIyY2Q\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/malwr.com\/analysis\/NTRjNzczYzVlNjE4NGI5NThlZjk4NWUzZjAyMTIyY2Q\/<\/a>\r\n\u00a0","_et_gb_content_width":"","footnotes":""},"categories":[327],"tags":[434,435,114,149,426,436,428,437,438],"class_list":["post-7041","post","type-post","status-publish","format-standard","hentry","category-alert","tag-als-pdf","tag-buchungskonto","tag-download","tag-email","tag-rechnung","tag-rechnungonline","tag-telekom","tag-trojaner","tag-vodafone"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Trojaner Warnung: Telekom E-Mail Betreff: RechnungOnline Monat Mai 2014, Buchungskonto: 2962325641 - Nextron Systems<\/title>\n<meta name=\"description\" content=\"Telekom E-Mail mit dem Betreff: RechnungOnline Monat Mai 2014, Buchungskonto\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nextron-systems.com\/2014\/05\/14\/trojaner-warnung-telekom-e-mail-betreff-rechnungonline-monat-mai-2014-buchungskonto-2962325641\/\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.nextron-systems.com\/2014\/05\/14\/trojaner-warnung-telekom-e-mail-betreff-rechnungonline-monat-mai-2014-buchungskonto-2962325641\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2014\/05\/14\/trojaner-warnung-telekom-e-mail-betreff-rechnungonline-monat-mai-2014-buchungskonto-2962325641\/\"},\"author\":{\"name\":\"Florian Roth\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919\"},\"headline\":\"Trojaner Warnung: Telekom E-Mail Betreff: RechnungOnline Monat Mai 2014, Buchungskonto: 2962325641\",\"datePublished\":\"2014-05-14T13:24:31+00:00\",\"dateModified\":\"2022-03-25T13:12:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2014\/05\/14\/trojaner-warnung-telekom-e-mail-betreff-rechnungonline-monat-mai-2014-buchungskonto-2962325641\/\"},\"wordCount\":438,\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"keywords\":[\"als pdf\",\"Buchungskonto\",\"download\",\"email\",\"Rechnung\",\"RechnungOnline\",\"Telekom\",\"trojaner\",\"vodafone\"],\"articleSection\":[\"Alert\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.nextron-systems.com\/2014\/05\/14\/trojaner-warnung-telekom-e-mail-betreff-rechnungonline-monat-mai-2014-buchungskonto-2962325641\/\",\"url\":\"https:\/\/www.nextron-systems.com\/2014\/05\/14\/trojaner-warnung-telekom-e-mail-betreff-rechnungonline-monat-mai-2014-buchungskonto-2962325641\/\",\"name\":\"Trojaner Warnung: Telekom E-Mail Betreff: RechnungOnline Monat Mai 2014, Buchungskonto: 2962325641 - Nextron Systems\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#website\"},\"datePublished\":\"2014-05-14T13:24:31+00:00\",\"dateModified\":\"2022-03-25T13:12:04+00:00\",\"description\":\"Telekom E-Mail mit dem Betreff: RechnungOnline Monat Mai 2014, Buchungskonto\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.nextron-systems.com\/2014\/05\/14\/trojaner-warnung-telekom-e-mail-betreff-rechnungonline-monat-mai-2014-buchungskonto-2962325641\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.nextron-systems.com\/#website\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"name\":\"Nextron Systems\",\"description\":\"We Detect Hackers\",\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.nextron-systems.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\",\"name\":\"Nextron Systems GmbH\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"contentUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"width\":260,\"height\":260,\"caption\":\"Nextron Systems GmbH\"},\"image\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919\",\"name\":\"Florian Roth\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g\",\"caption\":\"Florian Roth\"},\"description\":\"Florian Roth serves as the Head of Research and Development at Nextron Systems. With a background in IT security since 2000, he has delved deep into nation-state cyber attacks since 2012. Florian has developed the THOR Scanner and actively engages with the community via his Twitter handle @cyb3rops. He has contributed to open-source projects, including 'Sigma', a generic SIEM rule format, and 'LOKI', an open-source scanner. Additionally, he has shared valuable resources like a mapping of APT groups and operations and an Antivirus Event Analysis Cheat Sheet.\",\"url\":\"https:\/\/www.nextron-systems.com\/author\/florian\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Trojaner Warnung: Telekom E-Mail Betreff: RechnungOnline Monat Mai 2014, Buchungskonto: 2962325641 - Nextron Systems","description":"Telekom E-Mail mit dem Betreff: RechnungOnline Monat Mai 2014, Buchungskonto","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nextron-systems.com\/2014\/05\/14\/trojaner-warnung-telekom-e-mail-betreff-rechnungonline-monat-mai-2014-buchungskonto-2962325641\/","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.nextron-systems.com\/2014\/05\/14\/trojaner-warnung-telekom-e-mail-betreff-rechnungonline-monat-mai-2014-buchungskonto-2962325641\/#article","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/2014\/05\/14\/trojaner-warnung-telekom-e-mail-betreff-rechnungonline-monat-mai-2014-buchungskonto-2962325641\/"},"author":{"name":"Florian Roth","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919"},"headline":"Trojaner Warnung: Telekom E-Mail Betreff: RechnungOnline Monat Mai 2014, Buchungskonto: 2962325641","datePublished":"2014-05-14T13:24:31+00:00","dateModified":"2022-03-25T13:12:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.nextron-systems.com\/2014\/05\/14\/trojaner-warnung-telekom-e-mail-betreff-rechnungonline-monat-mai-2014-buchungskonto-2962325641\/"},"wordCount":438,"publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"keywords":["als pdf","Buchungskonto","download","email","Rechnung","RechnungOnline","Telekom","trojaner","vodafone"],"articleSection":["Alert"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.nextron-systems.com\/2014\/05\/14\/trojaner-warnung-telekom-e-mail-betreff-rechnungonline-monat-mai-2014-buchungskonto-2962325641\/","url":"https:\/\/www.nextron-systems.com\/2014\/05\/14\/trojaner-warnung-telekom-e-mail-betreff-rechnungonline-monat-mai-2014-buchungskonto-2962325641\/","name":"Trojaner Warnung: Telekom E-Mail Betreff: RechnungOnline Monat Mai 2014, Buchungskonto: 2962325641 - Nextron Systems","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/#website"},"datePublished":"2014-05-14T13:24:31+00:00","dateModified":"2022-03-25T13:12:04+00:00","description":"Telekom E-Mail mit dem Betreff: RechnungOnline Monat Mai 2014, Buchungskonto","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nextron-systems.com\/2014\/05\/14\/trojaner-warnung-telekom-e-mail-betreff-rechnungonline-monat-mai-2014-buchungskonto-2962325641\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.nextron-systems.com\/#website","url":"https:\/\/www.nextron-systems.com\/","name":"Nextron Systems","description":"We Detect Hackers","publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nextron-systems.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.nextron-systems.com\/#organization","name":"Nextron Systems GmbH","url":"https:\/\/www.nextron-systems.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","contentUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","width":260,"height":260,"caption":"Nextron Systems GmbH"},"image":{"@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919","name":"Florian Roth","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g","caption":"Florian Roth"},"description":"Florian Roth serves as the Head of Research and Development at Nextron Systems. With a background in IT security since 2000, he has delved deep into nation-state cyber attacks since 2012. Florian has developed the THOR Scanner and actively engages with the community via his Twitter handle @cyb3rops. He has contributed to open-source projects, including 'Sigma', a generic SIEM rule format, and 'LOKI', an open-source scanner. Additionally, he has shared valuable resources like a mapping of APT groups and operations and an Antivirus Event Analysis Cheat Sheet.","url":"https:\/\/www.nextron-systems.com\/author\/florian\/"}]}},"_links":{"self":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/7041","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/comments?post=7041"}],"version-history":[{"count":3,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/7041\/revisions"}],"predecessor-version":[{"id":7567,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/7041\/revisions\/7567"}],"wp:attachment":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/media?parent=7041"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/categories?post=7041"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/tags?post=7041"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}