{"id":1029,"date":"2020-10-30T20:06:01","date_gmt":"2020-10-30T20:06:01","guid":{"rendered":"https:\/\/webdev.locaterisk.com\/?p=1029"},"modified":"2026-02-12T14:47:35","modified_gmt":"2026-02-12T14:47:35","slug":"social-hacking-cyber-spionage-und-co","status":"publish","type":"post","link":"https:\/\/locaterisk.com\/en\/social-hacking-cyber-spionage-und-co\/","title":{"rendered":"Social Hacking, Cyber Espionage and Co."},"content":{"rendered":"<div class=\"wp-block-lr-blog-article-header-module\">\r\n    <div class=\"content\">\r\n\t\t<div class=\"headline\">\r\n\t\t\t<button class=\"to-blog-button\">Back to Blog                <a href=\"https:\/\/locaterisk.com\/en\/blog\/\"><\/a>\r\n\t\t\t<\/button>\r\n\t\t\t\t\t<\/div>\r\n        <div class=\"main-content\">\r\n\t\t\t\t\t\t<!--\r\n            <div class=\"header\">\r\n                <h6> <\/h6>\r\n            <\/div>\r\n\t\t\t\t\t\t-->\r\n            <h1 class=\"title\">Social Hacking, Cyber Espionage and Co.<\/h1>\r\n            <p class=\"paragraph\">Identity theft, fake website fraud, and encryption of data for ransom blackmail are just a fraction of the ways cybercriminals can cause businesses great difficulty. To find out what hackers can do and what they want to achieve, click here.<\/p>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\r\n\r\n\r\n\n\n\n<div class=\"wp-block-lr-blog-image-text-article-module blog-image-text-article\"><div class=\"content\"><div class=\"image\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Cubes-Generic_V02.jpg\"\/><\/div><h6><\/h6><\/div><\/div>\n\n\n\n<p>Cybercrime will play an increasingly important role in the future. Especially for companies. And only those who know their adversaries can better protect their companies. This makes it all the more important to know the technologies used by attackers and to understand how they work. In Germany alone, attacks run into the high six-figure range every day - and the trend is rising. The speed at which attacks are carried out and the focus of the attackers are changing. For example, at 190 GBit per second, it is no longer just operating systems or browsers that are attacked, but also chips, processors and surveillance cameras, among other things.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Human error, outdated hardware and lack of updates<\/h3>\n\n\n\n<p>Factors such as outdated software, human error, outdated or insufficient hardware, and failure to perform updates often make it easy for hackers to successfully carry out an attack. In 2019, the Hasso Plattner Institute analyzed nearly one billion user accounts as part of a study on password use, all of which were legally and freely available on the Internet due to data breaches. It found that 20 percent of users use identical passwords for different accounts or change them only slightly. The most shocking result was that the number combination 123456 was identified as the most frequently used password. Anyone who thinks that easily decipherable passwords in the private lives of employees are not a problem for their own company is mistaken. Many employees bring their private devices into the company network. If these are not sufficiently secured, hackers can quickly gain access to internal company data. But which attack options are available to cybercriminals at all? Five are then presented.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. phishing<\/h3>\n\n\n\n<p>Factors such as outdated software, human error, outdated or inadequate hardware, and failure to execute Phishing involves, for example, falsifying e-mails, blogs, or entire company websites. The goal is to get users to reveal their data. Since they think it is the original website, they disclose it. Retrospectively, this can cause damage to the companies concerned, as users no longer trust them and do not want to provide private information. Reputation can drop enormously as a result. In addition, the cybercriminals gain access to a lot of private information this way.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. social hacking<\/h3>\n\n\n\n<p>In social hacking, it is not the systems that are the target of the attack, but the company and its employees. This can happen through e-mails, for example. Covert attacks via social hacking are often carried out over a long period of time. The goal of the hackers is to disguise the hacking attack due to the large time span, as users are less likely to become aware of it this way. To reduce the risk of social hacking, it is important to sensitize employees to the issue so that they recognize potential attack attempts and react accordingly. Read our article 8 Measures to Protect Against Cybercrime - These are the security precautions every company should take.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Denial-of-Service- (DoS) und Distributed-Denial-of-Service-Angriffe (DDoS)<\/h3>\n\n\n\n<p>In a denial-of-service attack, systems are deliberately bombarded with so many requests at once that they can no longer handle the tasks. It's like more and more people throwing you a ball, so that at some point you are no longer able to catch them all. If such an attack is carried out in parallel by a very large number of host computers on which the attacker has installed malware, the process is dubbed a DDoS attack. Attacks of this type result in, for example, a website being inaccessible, customers not being able to order, etc.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. ransomware<\/h3>\n\n\n\n<p>When we talk about randsomware, we mean a type of extortion. In this context, for example, hackers infect the computer with a malware that encrypts all files. The data is only decrypted again after payment of a set sum. For companies, this poses several problems. On the one hand, they guarantee their customers that they will handle their data responsibly and securely, and they cannot keep this promise. On the other hand, they need the data to be able to work themselves.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. cyber espionage<\/h3>\n\n\n\n<p>Classic spying to obtain information is on the rise. Digital industrial espionage costs the German economy at least 50 billion euros a year. In the past ten to 15 years, there has been an enormous professionalization of attacks on computer systems and networks. Anyone who thinks that small and medium-sized companies are not affected by problems of this kind is mistaken. Current studies repeatedly show that even companies of this size are not protected against cyber espionage.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-contact-post-module\">\n\t<div id=\"lr-contact-form\" class=\"wp-block-lr-contact-post-module\">\n\t\t<div id=\"formular\" class=\"content\">\n\t\t\t<div class=\"inner-content\">\n\t\t\t\t<div class=\"column-2 feature-mode\">\n\t\t\t\t\t<h2>Request your personal Live-Demo now<\/h2>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t\t\t<p class=\"margin-b-36\">Identify and reduce your cyber risks through a comparable and understandable overview of your IT security. Let our experts advise you and find out how LocateRisk can help you solve your cyber risks.<\/p>\n\t\t\t\t\t\t\t<\/div>\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div> \n\t\t\t\t<div class=\"column-2\">\n\t\t\t\t\t<form action=\"\" class=\"form\" method=\"post\" role=\"form\" novalidate data-trp-original-action=\"\">\n\t\t\t\t\t\t<input type=\"text\" id=\"successmessage\" name=\"successmessage\" value=\"\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"errormessage\" name=\"errormessage\" value=\"\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"slug\" name=\"slug\" value=\"social-hacking-cyber-spionage-und-co\" hidden>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"name\"\n\t\t\t\t\t\t\t\tname=\"name\"\n\t\t\t\t\t\t\t\tplaceholder=\"first name\"\n\t\t\t\t\t\t\t\trequired\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"surname\"\n\t\t\t\t\t\t\t\tname=\"surname\"\n\t\t\t\t\t\t\t\tplaceholder=\"last name\"\n\t\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"email\"\n\t\t\t\t\t\t\tid=\"email\"\n\t\t\t\t\t\t\tname=\"email\"\n\t\t\t\t\t\t\tplaceholder=\"Email\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\tid=\"phone\"\n\t\t\t\t\t\t\tname=\"phone\"\n\t\t\t\t\t\t\tplaceholder=\"phone\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<h6 class=\"error-message\" hidden>...<\/h6>\n\t\t\t\t\t\t<div class=\"checkbox_container\">\n\t\t\t\t\t\t\t<div class=\"checkbox\">\n\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\t\ttype=\"checkbox\"\n\t\t\t\t\t\t\t\t\tid=\"checkbox\"\n\t\t\t\t\t\t\t\t\tname=\"checkbox\" \/>\n\n\t\t\t\t\t\t\t\t<label for=\"checkbox\"><\/label>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<p>I agree to the <a href=\"https:\/\/locaterisk.com\/en\/datenschutz\/\" target=\"_blank\" rel=\"noreferrer noopener\">privacy policy.<\/a> read<\/p> \n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"g-recaptcha\" data-sitekey=\"6LdErNoZAAAAAD1Re2jNxtDFfcDaL9iED5MRBzjR\" data-callback=\"verifyRecaptchaCallback\" data-expired-callback=\"expiredRecaptchaCallback\"><\/div>\n\t\t\t\t\t<input type=\"hidden\" name=\"g-recaptcha-response\" data-recaptcha \/>\n\n\t\t\t\t\t\t<button class=\"lr-button-link\" type=\"submit\">Schedule a Live Demo<\/button>\n\t\t\t\t\t<input type=\"hidden\" name=\"trp-form-language\" value=\"en\"\/><\/form>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\n\t<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-lr-contact-module\"><div class=\"content\"><h2>Want to find out more, book a demo or simply exchange ideas? We look forward to hearing from you!<\/h2><div class=\"contact-info-row\"><div class=\"contact-person-info\"><div class=\"avatar\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/06\/Lukas_Baumann_LocateRisk-300.png\"><\/div><p><span class=\"text before\">Your personal consultant<\/span><span class=\"bold name\"><strong>Lukas<\/strong><\/span> <span class=\"lastname\"><strong>Baumann<strong><\/strong><\/strong><\/span><strong><strong><span class=\"separator\"><\/span><span class=\"role\">CEO<\/span><\/strong><\/strong><\/p><\/div><p class=\"bold phone\"><strong><strong>+49 6151 6290246<\/strong><\/strong><\/p><strong><strong><a class=\"pr-1\" href=\"mailto: sales@locaterisk.com\">Get in Touch Now<\/a><\/strong><\/strong><\/div><\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-footer-module lr-footer-block\"><div class=\"content\"><div class=\"column0\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/assets\/img\/lr-logo.svg\"\/><\/div><div class=\"categories\"><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/locaterisk.com\/en\/\">Home<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/blog\/\">Blog<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/about\/\">About Us<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/kontakt\/\">Contact<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/impressum\/\">Legal Notice<\/a><\/div><div class=\"categories-break\"><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/datenschutz\/\">Privacy<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/gtc.pdf\">General Terms and Conditions<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/jobs\/\">Jobs<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/sec-information.pdf\">Security<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/app.secfix.com\/trust\/locaterisk\/d1e7d433b33643aea1880bfbfeab9f60\">Trust Center<\/a><\/div><\/div><div class=\"social\"><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/10\/gruppe-230@3x.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.instagram.com\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Instagram.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/twitter.com\/locaterisk\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/twitter.png\"\/><\/a><\/div><\/div><div class=\"description\"><h6>\u00a9 LocateRisk 2026<\/h6><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Cyberkriminalit\u00e4t spielt in der Zukunft eine immer gr\u00f6\u00dfere Rolle. Vor allem auch f\u00fcr Unternehmen. Und nur wer seine Gegner kennt, kann sein Unternehmen besser sch\u00fctzen. Daher ist es umso wichtiger, die von Angreifern eingesetzten Technologien zu kennen und ihre Funktionsweisen im Ansatz zu verstehen. Alleine in Deutschland finden t\u00e4glich Angriffe im hohen sechsstelligen Bereich statt [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":1056,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1029","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Social Hacking, Cyber Spionage und Co. - LocateRisk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/locaterisk.com\/en\/social-hacking-cyber-spionage-und-co\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Social Hacking, Cyber Spionage und Co. - LocateRisk\" \/>\n<meta property=\"og:description\" content=\"Cyberkriminalit\u00e4t spielt in der Zukunft eine immer gr\u00f6\u00dfere Rolle. Vor allem auch f\u00fcr Unternehmen. Und nur wer seine Gegner kennt, kann sein Unternehmen besser sch\u00fctzen. Daher ist es umso wichtiger, die von Angreifern eingesetzten Technologien zu kennen und ihre Funktionsweisen im Ansatz zu verstehen. Alleine in Deutschland finden t\u00e4glich Angriffe im hohen sechsstelligen Bereich statt [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/locaterisk.com\/en\/social-hacking-cyber-spionage-und-co\/\" \/>\n<meta property=\"og:site_name\" content=\"LocateRisk\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-30T20:06:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-12T14:47:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Cubes_Generisch_01.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lukas Baumann\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lukas Baumann\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/social-hacking-cyber-spionage-und-co\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/social-hacking-cyber-spionage-und-co\\\/\"},\"author\":{\"name\":\"Lukas Baumann\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/be285cd2771072ea30354332ce8b19cf\"},\"headline\":\"Social Hacking, Cyber Spionage und Co.\",\"datePublished\":\"2020-10-30T20:06:01+00:00\",\"dateModified\":\"2026-02-12T14:47:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/social-hacking-cyber-spionage-und-co\\\/\"},\"wordCount\":705,\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/social-hacking-cyber-spionage-und-co\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Cubes_Generisch_01.jpg\",\"articleSection\":[\"Blog post\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/social-hacking-cyber-spionage-und-co\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/social-hacking-cyber-spionage-und-co\\\/\",\"name\":\"Social Hacking, Cyber Spionage und Co. - LocateRisk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/social-hacking-cyber-spionage-und-co\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/social-hacking-cyber-spionage-und-co\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Cubes_Generisch_01.jpg\",\"datePublished\":\"2020-10-30T20:06:01+00:00\",\"dateModified\":\"2026-02-12T14:47:35+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/social-hacking-cyber-spionage-und-co\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/locaterisk.com\\\/social-hacking-cyber-spionage-und-co\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/social-hacking-cyber-spionage-und-co\\\/#primaryimage\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Cubes_Generisch_01.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Cubes_Generisch_01.jpg\",\"width\":1080,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/social-hacking-cyber-spionage-und-co\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/locaterisk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Social Hacking, Cyber Spionage und Co.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"name\":\"LocateRisk\",\"description\":\"IT-Sicherheit messen und vergleichen\",\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\",\"name\":\"LocateRisk\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"LocateRisk\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/locaterisk\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/be285cd2771072ea30354332ce8b19cf\",\"name\":\"Lukas Baumann\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c10e053effbd842a0cb8e0fdb227381472ec76a6419d29b4eaa27b5bbb937098?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c10e053effbd842a0cb8e0fdb227381472ec76a6419d29b4eaa27b5bbb937098?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c10e053effbd842a0cb8e0fdb227381472ec76a6419d29b4eaa27b5bbb937098?s=96&d=mm&r=g\",\"caption\":\"Lukas Baumann\"},\"sameAs\":[\"http:\\\/\\\/www.locaterisk.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Social hacking, cyber espionage and co. - LocateRisk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/locaterisk.com\/en\/social-hacking-cyber-spionage-und-co\/","og_locale":"en_US","og_type":"article","og_title":"Social Hacking, Cyber Spionage und Co. - LocateRisk","og_description":"Cyberkriminalit\u00e4t spielt in der Zukunft eine immer gr\u00f6\u00dfere Rolle. Vor allem auch f\u00fcr Unternehmen. Und nur wer seine Gegner kennt, kann sein Unternehmen besser sch\u00fctzen. Daher ist es umso wichtiger, die von Angreifern eingesetzten Technologien zu kennen und ihre Funktionsweisen im Ansatz zu verstehen. Alleine in Deutschland finden t\u00e4glich Angriffe im hohen sechsstelligen Bereich statt [&hellip;]","og_url":"https:\/\/locaterisk.com\/en\/social-hacking-cyber-spionage-und-co\/","og_site_name":"LocateRisk","article_published_time":"2020-10-30T20:06:01+00:00","article_modified_time":"2026-02-12T14:47:35+00:00","og_image":[{"width":1080,"height":1080,"url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Cubes_Generisch_01.jpg","type":"image\/jpeg"}],"author":"Lukas Baumann","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lukas Baumann","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/locaterisk.com\/social-hacking-cyber-spionage-und-co\/#article","isPartOf":{"@id":"https:\/\/locaterisk.com\/social-hacking-cyber-spionage-und-co\/"},"author":{"name":"Lukas Baumann","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/be285cd2771072ea30354332ce8b19cf"},"headline":"Social Hacking, Cyber Spionage und Co.","datePublished":"2020-10-30T20:06:01+00:00","dateModified":"2026-02-12T14:47:35+00:00","mainEntityOfPage":{"@id":"https:\/\/locaterisk.com\/social-hacking-cyber-spionage-und-co\/"},"wordCount":705,"publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"image":{"@id":"https:\/\/locaterisk.com\/social-hacking-cyber-spionage-und-co\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Cubes_Generisch_01.jpg","articleSection":["Blog post"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/locaterisk.com\/social-hacking-cyber-spionage-und-co\/","url":"https:\/\/locaterisk.com\/social-hacking-cyber-spionage-und-co\/","name":"Social hacking, cyber espionage and co. - LocateRisk","isPartOf":{"@id":"https:\/\/locaterisk.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/locaterisk.com\/social-hacking-cyber-spionage-und-co\/#primaryimage"},"image":{"@id":"https:\/\/locaterisk.com\/social-hacking-cyber-spionage-und-co\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Cubes_Generisch_01.jpg","datePublished":"2020-10-30T20:06:01+00:00","dateModified":"2026-02-12T14:47:35+00:00","breadcrumb":{"@id":"https:\/\/locaterisk.com\/social-hacking-cyber-spionage-und-co\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/locaterisk.com\/social-hacking-cyber-spionage-und-co\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/locaterisk.com\/social-hacking-cyber-spionage-und-co\/#primaryimage","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Cubes_Generisch_01.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Cubes_Generisch_01.jpg","width":1080,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/locaterisk.com\/social-hacking-cyber-spionage-und-co\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/locaterisk.com\/"},{"@type":"ListItem","position":2,"name":"Social Hacking, Cyber Spionage und Co."}]},{"@type":"WebSite","@id":"https:\/\/locaterisk.com\/de\/#website","url":"https:\/\/locaterisk.com\/de\/","name":"LocateRisk","description":"Measure and compare IT security","publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/locaterisk.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/locaterisk.com\/de\/#organization","name":"LocateRisk","url":"https:\/\/locaterisk.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","width":1920,"height":1080,"caption":"LocateRisk"},"image":{"@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/locaterisk\/"]},{"@type":"Person","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/be285cd2771072ea30354332ce8b19cf","name":"Lukas Baumann","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c10e053effbd842a0cb8e0fdb227381472ec76a6419d29b4eaa27b5bbb937098?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c10e053effbd842a0cb8e0fdb227381472ec76a6419d29b4eaa27b5bbb937098?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c10e053effbd842a0cb8e0fdb227381472ec76a6419d29b4eaa27b5bbb937098?s=96&d=mm&r=g","caption":"Lukas Baumann"},"sameAs":["http:\/\/www.locaterisk.com"]}]}},"_links":{"self":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/1029","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/comments?post=1029"}],"version-history":[{"count":34,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/1029\/revisions"}],"predecessor-version":[{"id":7582,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/1029\/revisions\/7582"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/media\/1056"}],"wp:attachment":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/media?parent=1029"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/categories?post=1029"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/tags?post=1029"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}