{"id":5133,"date":"2025-04-03T08:54:13","date_gmt":"2025-04-03T06:54:13","guid":{"rendered":"https:\/\/www.tec4net.com\/web\/?p=5133"},"modified":"2025-04-02T20:55:28","modified_gmt":"2025-04-02T18:55:28","slug":"31183","status":"publish","type":"post","link":"https:\/\/www.tec4net.com\/web\/2025\/04\/03\/31183\/","title":{"rendered":"Missbrauch von Microsoft Trusted Signing zum Signieren von Malware entdeckt"},"content":{"rendered":"<p class=\"\" data-start=\"292\" data-end=\"597\">Cyberkriminelle missbrauchen Microsofts Trusted Signing Service, um Malware mit kurzlebigen Dreitages-Zertifikaten zu signieren. Signierte Malware wirkt vertrauensw\u00fcrdiger und kann Sicherheitsmechanismen leichter umgehen. Besonders begehrt sind EV-Zertifikate, die eine erh\u00f6hte Vertrauensstufe besitzen.<\/p>\n<p class=\"\" data-start=\"599\" data-end=\"950\">Forscher entdeckten, dass Angreifer den 2024 eingef\u00fchrten Cloud-Dienst nutzen, um ihre Schadsoftware mit Microsofts Identit\u00e4t zu signieren. Obwohl die Zertifikate nur drei Tage g\u00fcltig sind, bleiben signierte Dateien bis zum Widerruf als sicher eingestuft. Microsoft setzt Bedrohungsanalysen ein, um Missbrauch zu erkennen und Zertifikate zu sperren.<\/p>\n<p class=\"\" data-start=\"952\" data-end=\"1190\">Quelle:<br data-start=\"963\" data-end=\"966\" \/><a class=\"\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-trusted-signing-service-abused-to-code-sign-malware\/\" target=\"_new\" rel=\"noopener\" data-start=\"966\" data-end=\"1188\">https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-trusted-signing-service-abused-to-code-sign-malware\/<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Wir sind Experten f\u00fcr Datenschutz und IT-Sicherheit<\/strong><\/p>\n<p>Profitieren Sie von unserer umfassenden Beratung zu den Themen Datenschutz und IT-Sicherheit. Unser erfahrenes Team unterst\u00fctzt Sie dabei, Ihre Website und digitalen Dienste datenschutzkonform zu gestalten um die gesetzlichen Vorgaben zu erf\u00fcllen.<\/p>\n<p>Kontaktieren Sie uns noch heute und sichern Sie sich praxisnahe Beratung zur Umsetzung der DSGVO und Normen wie ISO 27001, PCI-DSS, NIS-2 oder TISAX.<\/p>\n<p><strong>Datenschutz und IT-Sicherheit praktikabel umsetzen &#8211; tec4net GmbH<\/strong><\/p>\n<hr \/>\n<p><a href=\"https:\/\/www.tec4net.com\">www.tec4net.com<\/a> \u2013 <a href=\"https:\/\/www.it-news-blog.com\">www.it-news-blog.com<\/a> \u2013 <a href=\"https:\/\/www.it-sachverstand.info\">www.it-sachverstand.info<\/a> \u2013 <a href=\"https:\/\/www.datenschutz-muenchen.com\">www.datenschutz-muenchen.com<\/a> \u2013 <a href=\"http:\/\/it-sicherheit-muenchen.com\">www.it-sicherheit-muenchen.com<\/a><\/p>\n<p>&nbsp;<\/p>\n<p><span data-slate-fragment=\"JTVCJTdCJTIydHlwZSUyMiUzQSUyMnBhcmFncmFwaCUyMiUyQyUyMmNoaWxkcmVuJTIyJTNBJTVCJTdCJTIydGV4dCUyMiUzQSUyMkFsbGUlMjB1bnNlcmUlMjBORVdTJTIwdW50ZXIlMjAtJTIwaHR0cHMlM0ElMkYlMkZ3d3cudGVjNG5ldC5jb20lMkZ3ZWIlMkZjYXRlZ29yeSUyRmFsbGdlbWVpbiUyMiU3RCU1RCU3RCU1RA==\">Alle unsere NEWS -&gt; <a href=\"http:\/\/news.tec4net.com\">http:\/\/news.tec4net.com<\/a> \u2013 <a href=\"https:\/\/x.com\/tec4net\">https:\/\/x.com\/tec4net<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyberkriminelle missbrauchen Microsofts Trusted Signing Service, um Malware mit kurzlebigen Dreitages-Zertifikaten zu signieren. Signierte Malware wirkt vertrauensw\u00fcrdiger und kann Sicherheitsmechanismen leichter umgehen. Besonders begehrt sind EV-Zertifikate, die eine erh\u00f6hte Vertrauensstufe besitzen. Forscher entdeckten, dass Angreifer den 2024 eingef\u00fchrten Cloud-Dienst nutzen, um ihre Schadsoftware mit Microsofts Identit\u00e4t zu signieren. Obwohl die [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[3007,3013,3008,3009,3011,3010,3012],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Missbrauch von Microsoft Trusted Signing zum Signieren von Malware entdeckt - tec4net<\/title>\n<meta name=\"description\" content=\"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tec4net.com\/web\/2025\/04\/03\/31183\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Missbrauch von Microsoft Trusted Signing zum Signieren von Malware entdeckt - tec4net\" \/>\n<meta property=\"og:description\" content=\"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tec4net.com\/web\/2025\/04\/03\/31183\/\" \/>\n<meta property=\"og:site_name\" content=\"tec4net\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-03T06:54:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-02T18:55:28+00:00\" \/>\n<meta name=\"author\" content=\"Matthias Walter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Matthias Walter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"1\u00a0Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.tec4net.com\/web\/2025\/04\/03\/31183\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/2025\/04\/03\/31183\/\"},\"author\":{\"name\":\"Matthias Walter\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/eb2c0c81b5ce5b0320d91188184d409b\"},\"headline\":\"Missbrauch von Microsoft Trusted Signing zum Signieren von Malware entdeckt\",\"datePublished\":\"2025-04-03T06:54:13+00:00\",\"dateModified\":\"2025-04-02T18:55:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/2025\/04\/03\/31183\/\"},\"wordCount\":207,\"publisher\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/#organization\"},\"keywords\":[\"Beratung zur IT-Sicherheit nach ISO 27001\",\"Code-Signing-Sicherheit und Beratung\",\"Datenschutz und IT-Compliance-Check\",\"DSGVO-konforme Sicherheitsl\u00f6sungen\",\"EDV-Sachverst\u00e4ndiger f\u00fcr Cybersecurity\",\"Malware-Analyse und Schwachstellenpr\u00fcfung\",\"NIS-2-Umsetzung f\u00fcr Unternehmen\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tec4net.com\/web\/2025\/04\/03\/31183\/\",\"url\":\"https:\/\/www.tec4net.com\/web\/2025\/04\/03\/31183\/\",\"name\":\"Missbrauch von Microsoft Trusted Signing zum Signieren von Malware entdeckt - tec4net\",\"isPartOf\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/#website\"},\"datePublished\":\"2025-04-03T06:54:13+00:00\",\"dateModified\":\"2025-04-02T18:55:28+00:00\",\"description\":\"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/2025\/04\/03\/31183\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tec4net.com\/web\/2025\/04\/03\/31183\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tec4net.com\/web\/2025\/04\/03\/31183\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.tec4net.com\/web\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Missbrauch von Microsoft Trusted Signing zum Signieren von Malware entdeckt\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#website\",\"url\":\"https:\/\/www.tec4net.com\/web\/\",\"name\":\"tec4net\",\"description\":\"Ihr starker IT-Partner\",\"publisher\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tec4net.com\/web\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#organization\",\"name\":\"tec4net\",\"url\":\"https:\/\/www.tec4net.com\/web\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.tec4net.com\/web\/wp-content\/uploads\/2018\/12\/t4n_Logo_startseite.png\",\"contentUrl\":\"https:\/\/www.tec4net.com\/web\/wp-content\/uploads\/2018\/12\/t4n_Logo_startseite.png\",\"width\":178,\"height\":163,\"caption\":\"tec4net\"},\"image\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/eb2c0c81b5ce5b0320d91188184d409b\",\"name\":\"Matthias Walter\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c8945f23c3708dc375c12592ec9c9a7e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c8945f23c3708dc375c12592ec9c9a7e?s=96&d=mm&r=g\",\"caption\":\"Matthias Walter\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Missbrauch von Microsoft Trusted Signing zum Signieren von Malware entdeckt - tec4net","description":"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tec4net.com\/web\/2025\/04\/03\/31183\/","og_locale":"de_DE","og_type":"article","og_title":"Missbrauch von Microsoft Trusted Signing zum Signieren von Malware entdeckt - tec4net","og_description":"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003","og_url":"https:\/\/www.tec4net.com\/web\/2025\/04\/03\/31183\/","og_site_name":"tec4net","article_published_time":"2025-04-03T06:54:13+00:00","article_modified_time":"2025-04-02T18:55:28+00:00","author":"Matthias Walter","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"Matthias Walter","Gesch\u00e4tzte Lesezeit":"1\u00a0Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tec4net.com\/web\/2025\/04\/03\/31183\/#article","isPartOf":{"@id":"https:\/\/www.tec4net.com\/web\/2025\/04\/03\/31183\/"},"author":{"name":"Matthias Walter","@id":"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/eb2c0c81b5ce5b0320d91188184d409b"},"headline":"Missbrauch von Microsoft Trusted Signing zum Signieren von Malware entdeckt","datePublished":"2025-04-03T06:54:13+00:00","dateModified":"2025-04-02T18:55:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tec4net.com\/web\/2025\/04\/03\/31183\/"},"wordCount":207,"publisher":{"@id":"https:\/\/www.tec4net.com\/web\/#organization"},"keywords":["Beratung zur IT-Sicherheit nach ISO 27001","Code-Signing-Sicherheit und Beratung","Datenschutz und IT-Compliance-Check","DSGVO-konforme Sicherheitsl\u00f6sungen","EDV-Sachverst\u00e4ndiger f\u00fcr Cybersecurity","Malware-Analyse und Schwachstellenpr\u00fcfung","NIS-2-Umsetzung f\u00fcr Unternehmen"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.tec4net.com\/web\/2025\/04\/03\/31183\/","url":"https:\/\/www.tec4net.com\/web\/2025\/04\/03\/31183\/","name":"Missbrauch von Microsoft Trusted Signing zum Signieren von Malware entdeckt - tec4net","isPartOf":{"@id":"https:\/\/www.tec4net.com\/web\/#website"},"datePublished":"2025-04-03T06:54:13+00:00","dateModified":"2025-04-02T18:55:28+00:00","description":"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003","breadcrumb":{"@id":"https:\/\/www.tec4net.com\/web\/2025\/04\/03\/31183\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tec4net.com\/web\/2025\/04\/03\/31183\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.tec4net.com\/web\/2025\/04\/03\/31183\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.tec4net.com\/web\/"},{"@type":"ListItem","position":2,"name":"Missbrauch von Microsoft Trusted Signing zum Signieren von Malware entdeckt"}]},{"@type":"WebSite","@id":"https:\/\/www.tec4net.com\/web\/#website","url":"https:\/\/www.tec4net.com\/web\/","name":"tec4net","description":"Ihr starker IT-Partner","publisher":{"@id":"https:\/\/www.tec4net.com\/web\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tec4net.com\/web\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.tec4net.com\/web\/#organization","name":"tec4net","url":"https:\/\/www.tec4net.com\/web\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.tec4net.com\/web\/#\/schema\/logo\/image\/","url":"https:\/\/www.tec4net.com\/web\/wp-content\/uploads\/2018\/12\/t4n_Logo_startseite.png","contentUrl":"https:\/\/www.tec4net.com\/web\/wp-content\/uploads\/2018\/12\/t4n_Logo_startseite.png","width":178,"height":163,"caption":"tec4net"},"image":{"@id":"https:\/\/www.tec4net.com\/web\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/eb2c0c81b5ce5b0320d91188184d409b","name":"Matthias Walter","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c8945f23c3708dc375c12592ec9c9a7e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c8945f23c3708dc375c12592ec9c9a7e?s=96&d=mm&r=g","caption":"Matthias Walter"}}]}},"_links":{"self":[{"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/posts\/5133"}],"collection":[{"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/comments?post=5133"}],"version-history":[{"count":1,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/posts\/5133\/revisions"}],"predecessor-version":[{"id":5134,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/posts\/5133\/revisions\/5134"}],"wp:attachment":[{"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/media?parent=5133"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/categories?post=5133"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/tags?post=5133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}