{"id":25993,"date":"2023-04-14T15:26:00","date_gmt":"2023-04-14T13:26:00","guid":{"rendered":"https:\/\/perseus.de\/business-email-compromise-compromise-of-business-emails\/"},"modified":"2026-03-31T11:39:46","modified_gmt":"2026-03-31T09:39:46","slug":"business-email-compromise-compromise-of-business-emails","status":"publish","type":"post","link":"https:\/\/perseus.de\/en\/business-email-compromise-compromise-of-business-emails\/","title":{"rendered":"Business email compromise \/ compromise of business emails"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"25993\" class=\"elementor elementor-25993 elementor-22158\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cab3f18 e-flex e-con-boxed e-con e-parent\" data-id=\"cab3f18\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2a02b8b e-con-full e-flex e-con e-child\" data-id=\"2a02b8b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-183dd17 e-con-full e-flex e-con e-child\" data-id=\"183dd17\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f80ded elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"4f80ded\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Business email compromise \/ compromise of business emails\n<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d061a7 elementor-widget elementor-widget-image\" data-id=\"2d061a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png\" class=\"attachment-medium size-medium wp-image-25801\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-150x150.png 150w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-768x768.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a92f7fc e-flex e-con-boxed e-con e-parent\" data-id=\"a92f7fc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2863ab6 e-con-full e-flex e-con e-child\" data-id=\"2863ab6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-193729d e-con-full e-flex e-con e-child\" data-id=\"193729d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7f4ead7 elementor-widget elementor-widget-text-editor\" data-id=\"7f4ead7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<header class=\"Single__header Background Background--lightBlue\">\n<div class=\"container\">\n<div class=\"grid grid--size12 grid--size6D\">\n<div class=\"Share\">\n<div class=\"Module Text Background Background--lightBlue\">\n<div class=\"container\">\n<div class=\"grid grid--size12 grid--size8T\">\n<div class=\"Module Text Background Background--lightBlue\">\n<div class=\"container\">\n<div class=\"grid grid--size12 grid--size8T\">\n\nCompromise of business email traffic (business email compromise or BEC for short) is when email traffic is infiltrated, compromised or manipulated.\n\nBEC also includes when someone impersonates a person in the company to get the recipient to share confidential information, make financial transactions or perform other actions that jeopardize the security of the company in the long term.\n<h4><\/h4>\n<br> <h4><strong>What do cybercriminals do? <\/strong><\/h4>\nCybercriminals use various approaches to successfully carry out business email compromise attacks. On the one hand, social engineering tactics are used to carry out the fraud and, on the other hand, concrete, real compromises of email accounts and systems can be carried out.\n<br>\n<br>\n<h6><strong>1. fraud with social engineering<\/strong><\/h6>\nIn cases where the attackers use targeted social engineering to trick their victims into certain actions, the threat actor has no real access to internal systems. The affected persons are contacted from external email addresses. To increase the attack&#8217;s chances of success, criminal hackers invest time and effort to make their deceptive attacks look as realistic as possible.\n\nThey try to find out how the company is structured and organized, who the relevant people are and what responsibilities and accountabilities prevail. After gathering information, the criminals write emails in the name of an employee, the CEO or even a service provider or business partner and contact their targets. In order to better deceive potential victims, real e-mail addresses are imitated or only minimally changed so that the people concerned cannot easily recognize the fraud. A typical example of this would be CEO fraud.\n<br>\n<br>\n<h6><strong>2. compromise of e-mail accounts or systems<\/strong><\/h6>\nWhile in the above case the attacker only pretends to be part of the organization, in the second type of BEC attack he has real access to the email server or the email account of the victim or the person he pretends to be. This means that the attacker has access to the real e-mail account and is able, for example, to send e-mails from the compromised e-mail address or to read them using forwarding rules.\n\nIt is also possible for criminal hackers to intercept and manipulate emails. Criminal hackers gain access to email accounts or systems through phishing attacks, the use of malware or security vulnerabilities in applications, among other things.\n<blockquote><strong>A practical case to illustrate this: <\/strong>\n\nNew windows were installed at a company. After the work was completed, the final invoice was sent to the company. The accounting department complied with the request and paid the outstanding amount. Some time later, the company was contacted by the window installer and informed that the invoice was still outstanding.\n\nWhen the facts of the case were clarified, it emerged that the invoice the company had received had been manipulated and the payment information had been changed. As a cyberattack was suspected, the cyber forensics experts investigated the systems, emails, email server and invoice PDF. It turned out that the company&#8217;s email server had been compromised, allowing the email to be intercepted and manipulated by the attacker.<\/blockquote>\n<br>\n<h4><\/h4>\n<h4><strong>How do you protect yourself? <\/strong><\/h4>\n<div><\/div>\n<h6><strong>As an employee:<\/strong><\/h6>\nIn relation to the above-mentioned attack patterns:\n<ul>\n \t<li>Check whether the sender&#8217;s e-mail address is actually the corresponding e-mail or whether it contains unusual elements (extra letters or numbers, incorrect domain name, etc.).<\/li>\n \t<li>Pay attention to the way you speak, the wording and idioms.<\/li>\n \t<li>Keep a cool head even in stressful situations and don&#8217;t let yourself get rattled.<\/li>\n \t<li>Trust your instincts. If something seems strange to you, there is usually something to it.<\/li>\n \t<li>Get a second opinion or it is better to get too much insurance than too little.<\/li>\n<\/ul>\n<br>\nIn relation to other attack patterns, including phishing attacks:\n<ul>\n \t<li>Always treat e-mail attachments and links with suspicion.<\/li>\n \t<li>Do not click on links or download attachments in e-mails that do not appear to be trustworthy.<\/li>\n \t<li>Only visit reputable websites.<\/li>\n \t<li>Do not click indiscriminately on pop-ups or banner ads.<\/li>\n \t<li>Only download and install programs or software applications from trustworthy sources.<\/li>\n<\/ul>\n<h6><\/h6>\n<h6><strong>As managing director:<\/strong><\/h6>\n<ul>\n \t<li>Technical protective measures such as an active firewall and spam filters are not enough to protect against cyber attacks, such as phishing attacks or various social engineering attacks. You need to focus on your employees and get them involved.<\/li>\n \t<li>Provide your employees with comprehensive and sustainable cyber security awareness training.<\/li>\n \t<li>Offer your staff regular training courses on current attack patterns or types of attack. Alternatively, you can also commission external service providers &#8211; such as Perseus &#8211; to train your employees.<\/li>\n \t<li>Promote a corporate culture in which employees are encouraged to ask questions and get a second opinion when in doubt.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/header>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c69378d e-flex e-con-boxed e-con e-parent\" data-id=\"c69378d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ce588f7 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"ce588f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Business email compromise \/ compromise of business emails Compromise of business email traffic (business email compromise or BEC for short) is when email traffic is infiltrated, compromised or manipulated. BEC also includes when someone impersonates a person in the company to get the recipient to share confidential information, make financial transactions or perform other actions [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[28],"tags":[],"class_list":["post-25993","post","type-post","status-publish","format-standard","hentry","category-cyberlexikon"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Business email compromise \/ compromise of business emails - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/2023-04-14-business-e-mail-compromise-kompromittierung-von-gschaefts-e-mails\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Business email compromise \/ compromise of business emails - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Business email compromise \/ compromise of business emails Compromise of business email traffic (business email compromise or BEC for short) is when email traffic is infiltrated, compromised or manipulated. BEC also includes when someone impersonates a person in the company to get the recipient to share confidential information, make financial transactions or perform other actions [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/2023-04-14-business-e-mail-compromise-kompromittierung-von-gschaefts-e-mails\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-14T13:26:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-31T09:39:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/2023-04-14-business-e-mail-compromise-kompromittierung-von-gschaefts-e-mails\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/2023-04-14-business-e-mail-compromise-kompromittierung-von-gschaefts-e-mails\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Business email compromise \\\/ compromise of business emails\",\"datePublished\":\"2023-04-14T13:26:00+00:00\",\"dateModified\":\"2026-03-31T09:39:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/2023-04-14-business-e-mail-compromise-kompromittierung-von-gschaefts-e-mails\\\/\"},\"wordCount\":770,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/2023-04-14-business-e-mail-compromise-kompromittierung-von-gschaefts-e-mails\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"articleSection\":[\"Cyberlexikon\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/2023-04-14-business-e-mail-compromise-kompromittierung-von-gschaefts-e-mails\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/2023-04-14-business-e-mail-compromise-kompromittierung-von-gschaefts-e-mails\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/2023-04-14-business-e-mail-compromise-kompromittierung-von-gschaefts-e-mails\\\/\",\"name\":\"Business email compromise \\\/ compromise of business emails - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/2023-04-14-business-e-mail-compromise-kompromittierung-von-gschaefts-e-mails\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/2023-04-14-business-e-mail-compromise-kompromittierung-von-gschaefts-e-mails\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"datePublished\":\"2023-04-14T13:26:00+00:00\",\"dateModified\":\"2026-03-31T09:39:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/2023-04-14-business-e-mail-compromise-kompromittierung-von-gschaefts-e-mails\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/2023-04-14-business-e-mail-compromise-kompromittierung-von-gschaefts-e-mails\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/2023-04-14-business-e-mail-compromise-kompromittierung-von-gschaefts-e-mails\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/2023-04-14-business-e-mail-compromise-kompromittierung-von-gschaefts-e-mails\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Business email compromise \\\/ compromise of business emails\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Business email compromise \/ compromise of business emails - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/2023-04-14-business-e-mail-compromise-kompromittierung-von-gschaefts-e-mails\/","og_locale":"en_US","og_type":"article","og_title":"Business email compromise \/ compromise of business emails - Perseus Technologies","og_description":"Business email compromise \/ compromise of business emails Compromise of business email traffic (business email compromise or BEC for short) is when email traffic is infiltrated, compromised or manipulated. BEC also includes when someone impersonates a person in the company to get the recipient to share confidential information, make financial transactions or perform other actions [&hellip;]","og_url":"https:\/\/perseus.de\/2023-04-14-business-e-mail-compromise-kompromittierung-von-gschaefts-e-mails\/","og_site_name":"Perseus Technologies","article_published_time":"2023-04-14T13:26:00+00:00","article_modified_time":"2026-03-31T09:39:46+00:00","og_image":[{"width":800,"height":800,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Xenia Silbe","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/2023-04-14-business-e-mail-compromise-kompromittierung-von-gschaefts-e-mails\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/2023-04-14-business-e-mail-compromise-kompromittierung-von-gschaefts-e-mails\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Business email compromise \/ compromise of business emails","datePublished":"2023-04-14T13:26:00+00:00","dateModified":"2026-03-31T09:39:46+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/2023-04-14-business-e-mail-compromise-kompromittierung-von-gschaefts-e-mails\/"},"wordCount":770,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/2023-04-14-business-e-mail-compromise-kompromittierung-von-gschaefts-e-mails\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","articleSection":["Cyberlexikon"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/2023-04-14-business-e-mail-compromise-kompromittierung-von-gschaefts-e-mails\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/2023-04-14-business-e-mail-compromise-kompromittierung-von-gschaefts-e-mails\/","url":"https:\/\/perseus.de\/2023-04-14-business-e-mail-compromise-kompromittierung-von-gschaefts-e-mails\/","name":"Business email compromise \/ compromise of business emails - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/2023-04-14-business-e-mail-compromise-kompromittierung-von-gschaefts-e-mails\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/2023-04-14-business-e-mail-compromise-kompromittierung-von-gschaefts-e-mails\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","datePublished":"2023-04-14T13:26:00+00:00","dateModified":"2026-03-31T09:39:46+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/2023-04-14-business-e-mail-compromise-kompromittierung-von-gschaefts-e-mails\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/2023-04-14-business-e-mail-compromise-kompromittierung-von-gschaefts-e-mails\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/2023-04-14-business-e-mail-compromise-kompromittierung-von-gschaefts-e-mails\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/2023-04-14-business-e-mail-compromise-kompromittierung-von-gschaefts-e-mails\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Business email compromise \/ compromise of business emails"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/en\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/25993","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/comments?post=25993"}],"version-history":[{"count":4,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/25993\/revisions"}],"predecessor-version":[{"id":28062,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/25993\/revisions\/28062"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media?parent=25993"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/categories?post=25993"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/tags?post=25993"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}