{"id":3473,"date":"2024-08-22T10:10:55","date_gmt":"2024-08-22T08:10:55","guid":{"rendered":"https:\/\/www.tec4net.com\/web\/?p=3473"},"modified":"2024-08-22T01:19:28","modified_gmt":"2024-08-21T23:19:28","slug":"30651","status":"publish","type":"post","link":"https:\/\/www.tec4net.com\/web\/2024\/08\/22\/30651\/","title":{"rendered":"FudModule: Gef\u00e4hrliches Rootkit nutzt Windows-Schwachstelle aus"},"content":{"rendered":"<p>Ein hochentwickeltes Rootkit namens FudModule nutzte eine ungepatchte Sicherheitsl\u00fccke in Windows aus, um tief ins System einzudringen. Die Hackergruppe Lazarus, die f\u00fcr ihre ausgekl\u00fcgelten Cyberangriffe bekannt ist, nutzte diese Schwachstelle, um FudModule zu installieren. Die Schwachstelle, CVE-2024-38193, erlaubte es, Systemprivilegien zu erlangen und Sicherheitsmechanismen zu umgehen.<\/p>\n<p>Trotz einer fr\u00fchen Entdeckung dauerte es sechs Monate, bis Microsoft die L\u00fccke schloss, was den Angreifern ausreichend Zeit gab, zahlreiche Systeme zu infizieren, insbesondere in Unternehmen, die in der Luft- und Raumfahrt und Kryptow\u00e4hrung t\u00e4tig sind.<\/p>\n<p>Quelle:<br \/>\n<a href=\"https:\/\/tarnkappe.info\/artikel\/cyberangriffe\/fudmodule-ausgefeiltes-rootkit-graebt-sich-tief-in-windows-ein-300401.html\">https:\/\/tarnkappe.info\/artikel\/cyberangriffe\/fudmodule-ausgefeiltes-rootkit-graebt-sich-tief-in-windows-ein-300401.html<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Wir sind Experten f\u00fcr Datenschutz und IT-Sicherheit<\/strong><\/p>\n<p>Profitieren Sie von unserer umfassenden Beratung zu den Themen Datenschutz und IT-Sicherheit. Unser erfahrenes Team unterst\u00fctzt Sie dabei, Ihre Website und digitalen Dienste datenschutzkonform zu gestalten um die gesetzlichen Vorgaben zu erf\u00fcllen.<\/p>\n<p>Kontaktieren Sie uns noch heute und sichern Sie sich praxisnahe Beratung zur Umsetzung der DSGVO und Normen wie ISO 27001, PCI-DSS oder TISAX.<\/p>\n<p><strong>Datenschutz und IT-Sicherheit praktikabel umsetzen &#8211; tec4net GmbH<\/strong><\/p>\n<hr \/>\n<p><a href=\"https:\/\/www.tec4net.com\">www.tec4net.com<\/a> \u2013 <a href=\"https:\/\/www.it-news-blog.com\">www.it-news-blog.com<\/a> \u2013 <a href=\"https:\/\/www.it-sachverstand.info\">www.it-sachverstand.info<\/a> \u2013 <a href=\"https:\/\/www.datenschutz-muenchen.com\">www.datenschutz-muenchen.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ein hochentwickeltes Rootkit namens FudModule nutzte eine ungepatchte Sicherheitsl\u00fccke in Windows aus, um tief ins System einzudringen. Die Hackergruppe Lazarus, die f\u00fcr ihre ausgekl\u00fcgelten Cyberangriffe bekannt ist, nutzte diese Schwachstelle, um FudModule zu installieren. Die Schwachstelle, CVE-2024-38193, erlaubte es, Systemprivilegien zu erlangen und Sicherheitsmechanismen zu umgehen. Trotz einer fr\u00fchen Entdeckung [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[1129,1130,1128,1133,1132,1134,1131],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>FudModule: Gef\u00e4hrliches Rootkit nutzt Windows-Schwachstelle aus - tec4net<\/title>\n<meta name=\"description\" content=\"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tec4net.com\/web\/2024\/08\/22\/30651\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"FudModule: Gef\u00e4hrliches Rootkit nutzt Windows-Schwachstelle aus - tec4net\" \/>\n<meta property=\"og:description\" content=\"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tec4net.com\/web\/2024\/08\/22\/30651\/\" \/>\n<meta property=\"og:site_name\" content=\"tec4net\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-22T08:10:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-21T23:19:28+00:00\" \/>\n<meta name=\"author\" content=\"Matthias Walter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Matthias Walter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"1\u00a0Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.tec4net.com\/web\/2024\/08\/22\/30651\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/2024\/08\/22\/30651\/\"},\"author\":{\"name\":\"Matthias Walter\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/eb2c0c81b5ce5b0320d91188184d409b\"},\"headline\":\"FudModule: Gef\u00e4hrliches Rootkit nutzt Windows-Schwachstelle aus\",\"datePublished\":\"2024-08-22T08:10:55+00:00\",\"dateModified\":\"2024-08-21T23:19:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/2024\/08\/22\/30651\/\"},\"wordCount\":193,\"publisher\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/#organization\"},\"keywords\":[\"DSGVO-konformer Datenschutz in M\u00fcnchen\",\"FudModule Rootkit: Schutz vor Windows-Schwachstellen\",\"ISO 27001-Beratung f\u00fcr Unternehmen in M\u00fcnchen\",\"IT-Sicherheit f\u00fcr Windows vor Rootkits\",\"Schutz vor Advanced Persistent Threats (APT)\",\"Sicherheitsl\u00fccken-Management in Windows-Systemen\",\"Windows-Sicherheitsl\u00fccke CVE-2024-38193 Patch\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tec4net.com\/web\/2024\/08\/22\/30651\/\",\"url\":\"https:\/\/www.tec4net.com\/web\/2024\/08\/22\/30651\/\",\"name\":\"FudModule: Gef\u00e4hrliches Rootkit nutzt Windows-Schwachstelle aus - tec4net\",\"isPartOf\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/#website\"},\"datePublished\":\"2024-08-22T08:10:55+00:00\",\"dateModified\":\"2024-08-21T23:19:28+00:00\",\"description\":\"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/2024\/08\/22\/30651\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tec4net.com\/web\/2024\/08\/22\/30651\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tec4net.com\/web\/2024\/08\/22\/30651\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.tec4net.com\/web\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"FudModule: Gef\u00e4hrliches Rootkit nutzt Windows-Schwachstelle aus\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#website\",\"url\":\"https:\/\/www.tec4net.com\/web\/\",\"name\":\"tec4net\",\"description\":\"Ihr starker IT-Partner\",\"publisher\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tec4net.com\/web\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#organization\",\"name\":\"tec4net\",\"url\":\"https:\/\/www.tec4net.com\/web\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.tec4net.com\/web\/wp-content\/uploads\/2018\/12\/t4n_Logo_startseite.png\",\"contentUrl\":\"https:\/\/www.tec4net.com\/web\/wp-content\/uploads\/2018\/12\/t4n_Logo_startseite.png\",\"width\":178,\"height\":163,\"caption\":\"tec4net\"},\"image\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/eb2c0c81b5ce5b0320d91188184d409b\",\"name\":\"Matthias Walter\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c8945f23c3708dc375c12592ec9c9a7e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c8945f23c3708dc375c12592ec9c9a7e?s=96&d=mm&r=g\",\"caption\":\"Matthias Walter\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"FudModule: Gef\u00e4hrliches Rootkit nutzt Windows-Schwachstelle aus - tec4net","description":"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tec4net.com\/web\/2024\/08\/22\/30651\/","og_locale":"de_DE","og_type":"article","og_title":"FudModule: Gef\u00e4hrliches Rootkit nutzt Windows-Schwachstelle aus - tec4net","og_description":"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003","og_url":"https:\/\/www.tec4net.com\/web\/2024\/08\/22\/30651\/","og_site_name":"tec4net","article_published_time":"2024-08-22T08:10:55+00:00","article_modified_time":"2024-08-21T23:19:28+00:00","author":"Matthias Walter","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"Matthias Walter","Gesch\u00e4tzte Lesezeit":"1\u00a0Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tec4net.com\/web\/2024\/08\/22\/30651\/#article","isPartOf":{"@id":"https:\/\/www.tec4net.com\/web\/2024\/08\/22\/30651\/"},"author":{"name":"Matthias Walter","@id":"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/eb2c0c81b5ce5b0320d91188184d409b"},"headline":"FudModule: Gef\u00e4hrliches Rootkit nutzt Windows-Schwachstelle aus","datePublished":"2024-08-22T08:10:55+00:00","dateModified":"2024-08-21T23:19:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tec4net.com\/web\/2024\/08\/22\/30651\/"},"wordCount":193,"publisher":{"@id":"https:\/\/www.tec4net.com\/web\/#organization"},"keywords":["DSGVO-konformer Datenschutz in M\u00fcnchen","FudModule Rootkit: Schutz vor Windows-Schwachstellen","ISO 27001-Beratung f\u00fcr Unternehmen in M\u00fcnchen","IT-Sicherheit f\u00fcr Windows vor Rootkits","Schutz vor Advanced Persistent Threats (APT)","Sicherheitsl\u00fccken-Management in Windows-Systemen","Windows-Sicherheitsl\u00fccke CVE-2024-38193 Patch"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.tec4net.com\/web\/2024\/08\/22\/30651\/","url":"https:\/\/www.tec4net.com\/web\/2024\/08\/22\/30651\/","name":"FudModule: Gef\u00e4hrliches Rootkit nutzt Windows-Schwachstelle aus - tec4net","isPartOf":{"@id":"https:\/\/www.tec4net.com\/web\/#website"},"datePublished":"2024-08-22T08:10:55+00:00","dateModified":"2024-08-21T23:19:28+00:00","description":"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003","breadcrumb":{"@id":"https:\/\/www.tec4net.com\/web\/2024\/08\/22\/30651\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tec4net.com\/web\/2024\/08\/22\/30651\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.tec4net.com\/web\/2024\/08\/22\/30651\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.tec4net.com\/web\/"},{"@type":"ListItem","position":2,"name":"FudModule: Gef\u00e4hrliches Rootkit nutzt Windows-Schwachstelle aus"}]},{"@type":"WebSite","@id":"https:\/\/www.tec4net.com\/web\/#website","url":"https:\/\/www.tec4net.com\/web\/","name":"tec4net","description":"Ihr starker IT-Partner","publisher":{"@id":"https:\/\/www.tec4net.com\/web\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tec4net.com\/web\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.tec4net.com\/web\/#organization","name":"tec4net","url":"https:\/\/www.tec4net.com\/web\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.tec4net.com\/web\/#\/schema\/logo\/image\/","url":"https:\/\/www.tec4net.com\/web\/wp-content\/uploads\/2018\/12\/t4n_Logo_startseite.png","contentUrl":"https:\/\/www.tec4net.com\/web\/wp-content\/uploads\/2018\/12\/t4n_Logo_startseite.png","width":178,"height":163,"caption":"tec4net"},"image":{"@id":"https:\/\/www.tec4net.com\/web\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/eb2c0c81b5ce5b0320d91188184d409b","name":"Matthias Walter","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c8945f23c3708dc375c12592ec9c9a7e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c8945f23c3708dc375c12592ec9c9a7e?s=96&d=mm&r=g","caption":"Matthias Walter"}}]}},"_links":{"self":[{"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/posts\/3473"}],"collection":[{"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/comments?post=3473"}],"version-history":[{"count":1,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/posts\/3473\/revisions"}],"predecessor-version":[{"id":3476,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/posts\/3473\/revisions\/3476"}],"wp:attachment":[{"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/media?parent=3473"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/categories?post=3473"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/tags?post=3473"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}