{"id":22090,"date":"2021-04-13T16:32:40","date_gmt":"2021-04-13T14:32:40","guid":{"rendered":"https:\/\/test-blog.mailfence.com\/?p=22090"},"modified":"2025-09-16T15:44:09","modified_gmt":"2025-09-16T13:44:09","slug":"analyse-zum-microsoft-exchange-server-hack","status":"publish","type":"post","link":"https:\/\/blog.mailfence.com\/de\/analyse-zum-microsoft-exchange-server-hack\/","title":{"rendered":"Analyse zum Microsoft Exchange Server Hack"},"content":{"rendered":"\n<p><br>Bereits vor mehr als vier Wochen hat Microsoft erstmals eine Datenpanne auf lokal eingesetzten <a href=\"https:\/\/de.wikipedia.org\/wiki\/Microsoft_Exchange_Server\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Exchange<\/a> Servern best\u00e4tigt. Angreifer waren in der Lage, <a href=\"https:\/\/de.wikipedia.org\/wiki\/Superuser\" target=\"_blank\" rel=\"noreferrer noopener\">Administratorenrechte<\/a> auf den betroffenen Servern zu erlangen und damit Zugang zu Benutzer-E-Mails und Passw\u00f6rtern sowie zu den angeschlossenen Ger\u00e4ten im selben Netzwerk zu haben. In diesem Zusammenhang wurden auch eine Reihe anderer Enth\u00fcllungen publik.<\/p>\n\n\n\t\t<div data-elementor-type=\"section\" data-elementor-id=\"100847\" class=\"elementor elementor-100847 elementor-100761\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-124e1725 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"124e1725\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-654e4e21\" data-id=\"654e4e21\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3a3b1a23 elementor-widget elementor-widget-text-editor\" data-id=\"3a3b1a23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Mailfence \u2013 Ihre sichere Produktivit\u00e4tssuite<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c004279 elementor-widget elementor-widget-text-editor\" data-id=\"2c004279\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Holen Sie sich Ihre Privatsph\u00e4re zur\u00fcck mit<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-83e0dd6 elementor-icon-list--layout-inline elementor-align-center elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"83e0dd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-envelope-open-text\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M176 216h160c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16H176c-8.84 0-16 7.16-16 16v16c0 8.84 7.16 16 16 16zm-16 80c0 8.84 7.16 16 16 16h160c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16H176c-8.84 0-16 7.16-16 16v16zm96 121.13c-16.42 0-32.84-5.06-46.86-15.19L0 250.86V464c0 26.51 21.49 48 48 48h416c26.51 0 48-21.49 48-48V250.86L302.86 401.94c-14.02 10.12-30.44 15.19-46.86 15.19zm237.61-254.18c-8.85-6.94-17.24-13.47-29.61-22.81V96c0-26.51-21.49-48-48-48h-77.55c-3.04-2.2-5.87-4.26-9.04-6.56C312.6 29.17 279.2-.35 256 0c-23.2-.35-56.59 29.17-73.41 41.44-3.17 2.3-6 4.36-9.04 6.56H96c-26.51 0-48 21.49-48 48v44.14c-12.37 9.33-20.76 15.87-29.61 22.81A47.995 47.995 0 0 0 0 200.72v10.65l96 69.35V96h320v184.72l96-69.35v-10.65c0-14.74-6.78-28.67-18.39-37.77z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Nachrichten<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-calendar-alt\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M148 288h-40c-6.6 0-12-5.4-12-12v-40c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v40c0 6.6-5.4 12-12 12zm108-12v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm96 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm-96 96v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm-96 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm192 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm96-260v352c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V112c0-26.5 21.5-48 48-48h48V12c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v52h128V12c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v52h48c26.5 0 48 21.5 48 48zm-48 346V160H48v298c0 3.3 2.7 6 6 6h340c3.3 0 6-2.7 6-6z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Kalendern<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-folder\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M464 128H272l-54.63-54.63c-6-6-14.14-9.37-22.63-9.37H48C21.49 64 0 85.49 0 112v288c0 26.51 21.49 48 48 48h416c26.51 0 48-21.49 48-48V176c0-26.51-21.49-48-48-48zm0 272H48V112h140.12l54.63 54.63c6 6 14.14 9.37 22.63 9.37H464v224z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Dokumenten<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-users-cog\" viewBox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M610.5 341.3c2.6-14.1 2.6-28.5 0-42.6l25.8-14.9c3-1.7 4.3-5.2 3.3-8.5-6.7-21.6-18.2-41.2-33.2-57.4-2.3-2.5-6-3.1-9-1.4l-25.8 14.9c-10.9-9.3-23.4-16.5-36.9-21.3v-29.8c0-3.4-2.4-6.4-5.7-7.1-22.3-5-45-4.8-66.2 0-3.3.7-5.7 3.7-5.7 7.1v29.8c-13.5 4.8-26 12-36.9 21.3l-25.8-14.9c-2.9-1.7-6.7-1.1-9 1.4-15 16.2-26.5 35.8-33.2 57.4-1 3.3.4 6.8 3.3 8.5l25.8 14.9c-2.6 14.1-2.6 28.5 0 42.6l-25.8 14.9c-3 1.7-4.3 5.2-3.3 8.5 6.7 21.6 18.2 41.1 33.2 57.4 2.3 2.5 6 3.1 9 1.4l25.8-14.9c10.9 9.3 23.4 16.5 36.9 21.3v29.8c0 3.4 2.4 6.4 5.7 7.1 22.3 5 45 4.8 66.2 0 3.3-.7 5.7-3.7 5.7-7.1v-29.8c13.5-4.8 26-12 36.9-21.3l25.8 14.9c2.9 1.7 6.7 1.1 9-1.4 15-16.2 26.5-35.8 33.2-57.4 1-3.3-.4-6.8-3.3-8.5l-25.8-14.9zM496 368.5c-26.8 0-48.5-21.8-48.5-48.5s21.8-48.5 48.5-48.5 48.5 21.8 48.5 48.5-21.7 48.5-48.5 48.5zM96 224c35.3 0 64-28.7 64-64s-28.7-64-64-64-64 28.7-64 64 28.7 64 64 64zm224 32c1.9 0 3.7-.5 5.6-.6 8.3-21.7 20.5-42.1 36.3-59.2 7.4-8 17.9-12.6 28.9-12.6 6.9 0 13.7 1.8 19.6 5.3l7.9 4.6c.8-.5 1.6-.9 2.4-1.4 7-14.6 11.2-30.8 11.2-48 0-61.9-50.1-112-112-112S208 82.1 208 144c0 61.9 50.1 112 112 112zm105.2 194.5c-2.3-1.2-4.6-2.6-6.8-3.9-8.2 4.8-15.3 9.8-27.5 9.8-10.9 0-21.4-4.6-28.9-12.6-18.3-19.8-32.3-43.9-40.2-69.6-10.7-34.5 24.9-49.7 25.8-50.3-.1-2.6-.1-5.2 0-7.8l-7.9-4.6c-3.8-2.2-7-5-9.8-8.1-3.3.2-6.5.6-9.8.6-24.6 0-47.6-6-68.5-16h-8.3C179.6 288 128 339.6 128 403.2V432c0 26.5 21.5 48 48 48h255.4c-3.7-6-6.2-12.8-6.2-20.3v-9.2zM173.1 274.6C161.5 263.1 145.6 256 128 256H64c-35.3 0-64 28.7-64 64v32c0 17.7 14.3 32 32 32h65.9c6.3-47.4 34.9-87.3 75.2-109.4z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Gruppen<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-436babb elementor-align-center elementor-widget elementor-widget-button\" data-id=\"436babb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/mailfence.com\/de\/#pricing\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Kostenlos anmelden<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-hintergrunde-zum-microsoft-exchange-server-hack\"><strong>Hintergr\u00fcnde zum Microsoft Exchange Server-Hack<\/strong><\/h2>\n\n\n\n<p>Am <strong>5. Januar 2021<\/strong> <a href=\"https:\/\/twitter.com\/orange_8361\/status\/1346401788811825153\" target=\"_blank\" rel=\"noreferrer noopener\">meldete<\/a> ein Mitarbeiter des Sicherheitstestunternehmens DEVCORE die erste bekannte Schwachstelle an Microsoft. Dies wurde dann von Microsoft am 8. Januar <a href=\"https:\/\/krebsonsecurity.com\/2021\/03\/a-basic-timeline-of-the-exchange-mass-hack\/\" target=\"_blank\" rel=\"noreferrer noopener\">best\u00e4tigt<\/a>. Im selben Monat wurden mehrere Einbr\u00fcche in lokale Microsoft Exchange Server von unterschiedlichen Betroffenen entdeckt, die alle Microsoft alarmierten.<\/p>\n\n\n\n<p>Um den <strong>26. und 27. Februar<\/strong> herum begannen Angreifer damit, Microsoft Exchange Server massenhaft zu scannen, um eine Backdoor zu finden. Dies geschah offenbar vor allem in <a href=\"https:\/\/www.nbcnews.com\/tech\/security\/really-messy-hack-microsofts-email-system-getting-worse-rcna377\" target=\"_blank\" rel=\"noreferrer noopener\">Erwartung<\/a> eines Patches von Microsoft.<\/p>\n\n\n\n<p>Am <strong>2. M\u00e4rz<\/strong> <a href=\"https:\/\/msrc-blog.microsoft.com\/2021\/03\/02\/multiple-security-updates-released-for-exchange-server\/\" target=\"_blank\" rel=\"noreferrer noopener\">ver\u00f6ffentlichte<\/a> Microsoft Updates zum Patchen von vier Zero-Day-Schwachstellen in der Code-Basis von Microsoft Exchange Server und schrieb diese mit hoher Wahrscheinlichkeit einer <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/03\/02\/hafnium-targeting-exchange-servers\/\" target=\"_blank\" rel=\"noreferrer noopener\">bekannten Hackergruppe<\/a> zu. Sp\u00e4ter wurden <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/more-hacking-groups-join-microsoft-exchange-attack-frenzy\/\" target=\"_blank\" rel=\"noreferrer noopener\">weitere Hackergruppen<\/a> in Verbindung gebracht.<\/p>\n\n\n\n<p>Am <strong>5. M\u00e4rz<\/strong> <a href=\"https:\/\/krebsonsecurity.com\/2021\/03\/at-least-30000-u-s-organizations-newly-hacked-via-holes-in-microsofts-email-software\/\" target=\"_blank\" rel=\"noreferrer noopener\">verbreitete<\/a> ein bekannter Cybersecurity-Journalist die Nachricht, dass mindestens 30.000 Organisationen in den USA und Tausende weltweit Backdoors installiert haben. Sicherheitsexperten bem\u00fchten sich, die Opfer zu benachrichtigen, und betonten gleichzeitig, dass sie sich auf eine weitere Angriffsserie aufgrund bereits installierter Backdoors auf betroffenen Servern vorbereiten.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-microsoft-exchange-server-hack-aktueller-stand-der-dinge\"><strong>Microsoft Exchange Server Hack: Aktueller Stand der Dinge<\/strong><\/h2>\n\n\n\n<p>Am <strong>12. M\u00e4rz 2021<\/strong> <a href=\"https:\/\/twitter.com\/briankrebs\/status\/1370565978153684994\" target=\"_blank\" rel=\"noreferrer noopener\">twitterte<\/a> Microsoft, dass immer noch 82.000 ungepatchte Microsoft Exchange-Server gef\u00e4hrdet sind. Da rechtzeitig kein Update durchgef\u00fchrt worden war, wurden viele dieser Server weiterhin angegriffen. Au\u00dferdem kam es bereits zum Einsatz unterschiedlicher <a href=\"https:\/\/blog.mailfence.com\/top-5-ways-protect-your-device-from-ransomware\/\" target=\"_blank\" rel=\"noreferrer noopener\">Ransomware<\/a> von Angreifern auf bereits infizierten Servern.<\/p>\n\n\n\n<p>Am <strong>22. M\u00e4rz<\/strong> k\u00fcndigte Microsoft an, dass bei 92% der lokal eingesetzten Microsoft Exchange Server die Schwachstelle entweder gepatcht oder zumindest entsch\u00e4rft worden sei.<\/p>\n\n\n\n<p>Am <strong>12. April<\/strong> hat die CISA zwei neue Malware Analysis Reports (MARs) zum <a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa21-062a\" target=\"_blank\" rel=\"noreferrer noopener\">Alert AA21-062A: Mitigate Microsoft Exchange Server Vulnerabilities<\/a> hinzugef\u00fcgt. Microsoft entsch\u00e4rfte weitere damit verbundenen Probleme im <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2021-Apr\" target=\"_blank\" rel=\"noreferrer noopener\">Sicherheitsupdate vom April 2021<\/a>.<\/p>\n\n\n\n<p>Da die Angreifer vier verschiedene Zero-Day-Exploits nutzten und diese miteinander verketteten, um Administratorenzugriff auf den betroffenen Servern zu erlangen, waren sie in der Lage, Backdoors zu installieren. Es ist daher f\u00fcr jeden Administrator eines On-Premise Microsoft Exchange Servers sehr wichtig, nicht nur Patches zu installieren, sondern auch alle identifizierten Exploits oder Schwachstellen zu beheben (unter Verwendung bekannter <a href=\"https:\/\/msrc-blog.microsoft.com\/2021\/03\/02\/multiple-security-updates-released-for-exchange-server\/\" target=\"_blank\" rel=\"noreferrer noopener\">Richtlinien<\/a> von Microsoft und anderen <a href=\"https:\/\/us-cert.cisa.gov\/ncas\/current-activity\/2021\/03\/06\/microsoft-ioc-detection-tool-exchange-server-vulnerabilities\" target=\"_blank\" rel=\"noreferrer noopener\">unabh\u00e4ngigen IoCs<\/a>).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-mailfence-war-zu-keiner-zeit-betroffen\"><strong>Mailfence war zu keiner Zeit betroffen<\/strong><\/h2>\n\n\n\n<p>Mailfence bietet ActiveSync-Protokoll- Connectivity. Unsere Exchange ActiveSync (EAS)-Implementierung verwendet <a href=\"https:\/\/docs.microsoft.com\/en-us\/openspecs\/exchange_server_protocols\/ms-oxprotlp\/229f77ea-6518-4fe7-84fe-bd535fc6c32e\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft-Spezifikationen<\/a>, ist aber ein Synchronisationsprotokoll, das nichts mit Exchange-Servern zu tun hat. Sie teilen sich nur zuf\u00e4llig das Wort &#8218;Exchange&#8216;. Wir teilen keinen Code mit dem angebotenen On-Premise Microsoft Exchange Server (oder einem seiner Dienste). Daher war unser Dienst zu keener Zeit betroffen.<\/p>\n\n\n\n<p>Wir haben dies auch \u00fcber unseren Twitter Account ver\u00f6ffentlicht:<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/Mailfence?ref_src=twsrc%5Etfw\">@Mailfence<\/a> Hey, have you folks seen this? <a href=\"https:\/\/t.co\/FFy8jyjJnG\">https:\/\/t.co\/FFy8jyjJnG<\/a> You run an Exchange server, can you share what steps you&#39;ve taken? I have an account with you and would love some peace of mind!<\/p>&mdash; PingZing (@pingzingy) <a href=\"https:\/\/twitter.com\/pingzingy\/status\/1369633485992980480?ref_src=twsrc%5Etfw\">March 10, 2021<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">We run our own implementation of Microsoft specifications. Mailfence users are not impacted.<\/p>&mdash; Mailfence (@Mailfence) <a href=\"https:\/\/twitter.com\/Mailfence\/status\/1369701176866930700?ref_src=twsrc%5Etfw\">March 10, 2021<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">You may have heard that <a href=\"https:\/\/twitter.com\/hashtag\/Microsoft?src=hash&amp;ref_src=twsrc%5Etfw\">#Microsoft<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/Exchange?src=hash&amp;ref_src=twsrc%5Etfw\">#Exchange<\/a> got hacked. \ud83d\udd13<br><br>Exchange is not the same as <a href=\"https:\/\/twitter.com\/hashtag\/ActiveSync?src=hash&amp;ref_src=twsrc%5Etfw\">#ActiveSync<\/a> Exchange the protocol  Mailfence uses.<br><br>If your mail is hosted on exchange servers and you are worried about the hack. <a href=\"https:\/\/twitter.com\/hashtag\/Mailfence?src=hash&amp;ref_src=twsrc%5Etfw\">#Mailfence<\/a> has you covered. 1\/2 <a href=\"https:\/\/t.co\/8POnFDtDLc\">pic.twitter.com\/8POnFDtDLc<\/a><\/p>&mdash; Mailfence (@Mailfence) <a href=\"https:\/\/twitter.com\/Mailfence\/status\/1371438664635580420?ref_src=twsrc%5Etfw\">March 15, 2021<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-bevorzugen-sie-dienste-die-vertraulich-by-design-sind-und-verschlusselung-bevorzugen\"><strong>Bevorzugen Sie Dienste, die vertraulich \u201eby Design\u201c sind und Verschl\u00fcsselung bevorzugen<\/strong><\/h2>\n\n\n\n<p>Mailfence ist ein <a href=\"https:\/\/mailfence.com\/en\/secure-email.jsp\">sicherer<\/a> und <a href=\"https:\/\/mailfence.com\/en\/private-email.jsp\">vertraulicher<\/a> E-Mail-Service, der die <a href=\"https:\/\/blog.mailfence.com\/de\/sicherheit-vertraulichkeit-und-anonymitaet-von-nutzerdaten\/\">Privatsph\u00e4re der Benutzerdaten respektiert<\/a> und eine <a href=\"https:\/\/blog.mailfence.com\/de\/ende-zu-ende-e-mail-verschluesselung\/\">Ende-zu-Ende-Verschl\u00fcsselung<\/a> f\u00fcr <a href=\"https:\/\/kb.mailfence.com\/categories\/encryption-and-digital-signatures\/\">E-Mails<\/a> bietet. Die Ende-zu-Ende-verschl\u00fcsselten Daten bleiben auch bei einem kompromittierten Server gesch\u00fctzt. Wir planen, diese Art der Verschl\u00fcsselung auch auf gesendete\/empfangene Klartextnachrichten und das Dokumententool auszuweiten. Wir planen au\u00dferdem, im Laufe dieses Jahres die Daten \u201eat rest\u201c zu verschl\u00fcsseln, was den Datenschutz f\u00fcr die Benutzer auf ein noch h\u00f6heres Niveau heben wird. Seien Sie gespannt!<\/p>\n\n\n\n<p>Erfahren Sie mehr \u00fcber uns auf unserer <a href=\"https:\/\/mailfence.com\/de\/press.jsp\">Presse-Seite.<\/a><\/p>\n\n\n\n<p>Oder folgen Sie uns auf <a href=\"https:\/\/twitter.com\/mailfence\" target=\"_blank\" rel=\"noreferrer noopener\">Twitter<\/a>\/<a href=\"https:\/\/www.reddit.com\/r\/mailfence\" target=\"_blank\" rel=\"noreferrer noopener\">Reddit<\/a> und bleiben Sie stets auf dem Laufenden.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bereits vor mehr als vier Wochen hat Microsoft erstmals eine Datenpanne auf lokal eingesetzten Microsoft Exchange Servern best\u00e4tigt. Angreifer waren in der Lage, Administratorenrechte auf den betroffenen Servern zu erlangen und damit Zugang zu Benutzer-E-Mails und Passw\u00f6rtern sowie zu den angeschlossenen Ger\u00e4ten im selben Netzwerk zu haben. In diesem Zusammenhang wurden auch eine Reihe anderer [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":85569,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18712,452],"tags":[],"class_list":["post-22090","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mailfence-neuigkeiten","category-sicherheit"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Was war los beim Microsoft Exchange Server Hack | Mailfence Blog<\/title>\n<meta name=\"description\" content=\"Microsoft Exchange Server wurden gehackt. Mailfence war nicht betroffen. Wir verwenden ActiveSync Exchange , was nicht dasselbe ist.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.mailfence.com\/de\/analyse-zum-microsoft-exchange-server-hack\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Analyse zum Microsoft Exchange Server Hack | Mailfence Blog\" \/>\n<meta property=\"og:description\" content=\"Analyse zum Microsoft Exchange Server Hack | Mailfence Blog\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.mailfence.com\/de\/analyse-zum-microsoft-exchange-server-hack\/\" \/>\n<meta property=\"og:site_name\" content=\"Mailfence Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/mailfence\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-13T14:32:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-16T13:44:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2021\/04\/43.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"M Salman Nadeem\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@0xSalman\" \/>\n<meta name=\"twitter:site\" content=\"@mailfence\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"M Salman Nadeem\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"3\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\/\/blog.mailfence.com\/de\/analyse-zum-microsoft-exchange-server-hack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.mailfence.com\/de\/analyse-zum-microsoft-exchange-server-hack\/\"},\"author\":{\"name\":\"M Salman Nadeem\",\"@id\":\"https:\/\/blog.mailfence.com\/de\/#\/schema\/person\/0a1800f7a6842b23ccef1107cec8c962\"},\"headline\":\"Analyse zum Microsoft Exchange Server Hack\",\"datePublished\":\"2021-04-13T14:32:40+00:00\",\"dateModified\":\"2025-09-16T13:44:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.mailfence.com\/de\/analyse-zum-microsoft-exchange-server-hack\/\"},\"wordCount\":633,\"publisher\":{\"@id\":\"https:\/\/blog.mailfence.com\/de\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.mailfence.com\/de\/analyse-zum-microsoft-exchange-server-hack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2021\/04\/43.png\",\"articleSection\":[\"Mailfence Neuigkeiten\",\"Sicherheit\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.mailfence.com\/de\/analyse-zum-microsoft-exchange-server-hack\/\",\"url\":\"https:\/\/blog.mailfence.com\/de\/analyse-zum-microsoft-exchange-server-hack\/\",\"name\":\"Was war los beim Microsoft Exchange Server Hack | Mailfence Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.mailfence.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.mailfence.com\/de\/analyse-zum-microsoft-exchange-server-hack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.mailfence.com\/de\/analyse-zum-microsoft-exchange-server-hack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2021\/04\/43.png\",\"datePublished\":\"2021-04-13T14:32:40+00:00\",\"dateModified\":\"2025-09-16T13:44:09+00:00\",\"description\":\"Microsoft Exchange Server wurden gehackt. Mailfence war nicht betroffen. Wir verwenden ActiveSync Exchange , was nicht dasselbe ist.\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.mailfence.com\/de\/analyse-zum-microsoft-exchange-server-hack\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.mailfence.com\/de\/analyse-zum-microsoft-exchange-server-hack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/blog.mailfence.com\/de\/analyse-zum-microsoft-exchange-server-hack\/#primaryimage\",\"url\":\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2021\/04\/43.png\",\"contentUrl\":\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2021\/04\/43.png\",\"width\":600,\"height\":600,\"caption\":\"dhfhfhg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.mailfence.com\/de\/analyse-zum-microsoft-exchange-server-hack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Homepage\",\"item\":\"https:\/\/blog.mailfence.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sicherheit\",\"item\":\"https:\/\/blog.mailfence.com\/de\/category\/sicherheit\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Analyse zum Microsoft Exchange Server Hack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.mailfence.com\/de\/#website\",\"url\":\"https:\/\/blog.mailfence.com\/de\/\",\"name\":\"Mailfence Blog\",\"description\":\"Mailfence Blog. Get the latest news about secure email and Internet privacy.\",\"publisher\":{\"@id\":\"https:\/\/blog.mailfence.com\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.mailfence.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.mailfence.com\/de\/#organization\",\"name\":\"Mailfence\",\"url\":\"https:\/\/blog.mailfence.com\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/blog.mailfence.com\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png\",\"contentUrl\":\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png\",\"width\":1812,\"height\":358,\"caption\":\"Mailfence\"},\"image\":{\"@id\":\"https:\/\/blog.mailfence.com\/de\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/mailfence\/\",\"https:\/\/x.com\/mailfence\",\"https:\/\/www.reddit.com\/r\/Mailfence\/\",\"https:\/\/www.linkedin.com\/company\/mailfence\",\"https:\/\/www.instagram.com\/mailfence_\/\",\"https:\/\/www.youtube.com\/@mailfence\",\"https:\/\/en.wikipedia.org\/wiki\/Mailfence\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.mailfence.com\/de\/#\/schema\/person\/0a1800f7a6842b23ccef1107cec8c962\",\"name\":\"M Salman Nadeem\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g\",\"caption\":\"M Salman Nadeem\"},\"description\":\"Salman works as an Information Security Analyst for Mailfence. His areas of interest include cryptography, security architecture and design, access control, and operations security. You can follow him on LinkedIn @mohammadsalmannadeem.\",\"sameAs\":[\"www.linkedin.com\/in\/mohammadsalmannadeem\",\"https:\/\/x.com\/0xSalman\"],\"url\":\"https:\/\/blog.mailfence.com\/de\/author\/msalman\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Was war los beim Microsoft Exchange Server Hack | Mailfence Blog","description":"Microsoft Exchange Server wurden gehackt. Mailfence war nicht betroffen. Wir verwenden ActiveSync Exchange , was nicht dasselbe ist.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.mailfence.com\/de\/analyse-zum-microsoft-exchange-server-hack\/","og_locale":"de_DE","og_type":"article","og_title":"Analyse zum Microsoft Exchange Server Hack | Mailfence Blog","og_description":"Analyse zum Microsoft Exchange Server Hack | Mailfence Blog","og_url":"https:\/\/blog.mailfence.com\/de\/analyse-zum-microsoft-exchange-server-hack\/","og_site_name":"Mailfence Blog","article_publisher":"https:\/\/www.facebook.com\/mailfence\/","article_published_time":"2021-04-13T14:32:40+00:00","article_modified_time":"2025-09-16T13:44:09+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2021\/04\/43.png","type":"image\/png"}],"author":"M Salman Nadeem","twitter_card":"summary_large_image","twitter_creator":"@0xSalman","twitter_site":"@mailfence","twitter_misc":{"Verfasst von":"M Salman Nadeem","Gesch\u00e4tzte Lesezeit":"3\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/blog.mailfence.com\/de\/analyse-zum-microsoft-exchange-server-hack\/#article","isPartOf":{"@id":"https:\/\/blog.mailfence.com\/de\/analyse-zum-microsoft-exchange-server-hack\/"},"author":{"name":"M Salman Nadeem","@id":"https:\/\/blog.mailfence.com\/de\/#\/schema\/person\/0a1800f7a6842b23ccef1107cec8c962"},"headline":"Analyse zum Microsoft Exchange Server Hack","datePublished":"2021-04-13T14:32:40+00:00","dateModified":"2025-09-16T13:44:09+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.mailfence.com\/de\/analyse-zum-microsoft-exchange-server-hack\/"},"wordCount":633,"publisher":{"@id":"https:\/\/blog.mailfence.com\/de\/#organization"},"image":{"@id":"https:\/\/blog.mailfence.com\/de\/analyse-zum-microsoft-exchange-server-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2021\/04\/43.png","articleSection":["Mailfence Neuigkeiten","Sicherheit"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/blog.mailfence.com\/de\/analyse-zum-microsoft-exchange-server-hack\/","url":"https:\/\/blog.mailfence.com\/de\/analyse-zum-microsoft-exchange-server-hack\/","name":"Was war los beim Microsoft Exchange Server Hack | Mailfence Blog","isPartOf":{"@id":"https:\/\/blog.mailfence.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.mailfence.com\/de\/analyse-zum-microsoft-exchange-server-hack\/#primaryimage"},"image":{"@id":"https:\/\/blog.mailfence.com\/de\/analyse-zum-microsoft-exchange-server-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2021\/04\/43.png","datePublished":"2021-04-13T14:32:40+00:00","dateModified":"2025-09-16T13:44:09+00:00","description":"Microsoft Exchange Server wurden gehackt. Mailfence war nicht betroffen. Wir verwenden ActiveSync Exchange , was nicht dasselbe ist.","breadcrumb":{"@id":"https:\/\/blog.mailfence.com\/de\/analyse-zum-microsoft-exchange-server-hack\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.mailfence.com\/de\/analyse-zum-microsoft-exchange-server-hack\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/blog.mailfence.com\/de\/analyse-zum-microsoft-exchange-server-hack\/#primaryimage","url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2021\/04\/43.png","contentUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2021\/04\/43.png","width":600,"height":600,"caption":"dhfhfhg"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.mailfence.com\/de\/analyse-zum-microsoft-exchange-server-hack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Homepage","item":"https:\/\/blog.mailfence.com\/de\/"},{"@type":"ListItem","position":2,"name":"Sicherheit","item":"https:\/\/blog.mailfence.com\/de\/category\/sicherheit\/"},{"@type":"ListItem","position":3,"name":"Analyse zum Microsoft Exchange Server Hack"}]},{"@type":"WebSite","@id":"https:\/\/blog.mailfence.com\/de\/#website","url":"https:\/\/blog.mailfence.com\/de\/","name":"Mailfence Blog","description":"Mailfence Blog. Get the latest news about secure email and Internet privacy.","publisher":{"@id":"https:\/\/blog.mailfence.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.mailfence.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/blog.mailfence.com\/de\/#organization","name":"Mailfence","url":"https:\/\/blog.mailfence.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/blog.mailfence.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png","contentUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png","width":1812,"height":358,"caption":"Mailfence"},"image":{"@id":"https:\/\/blog.mailfence.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/mailfence\/","https:\/\/x.com\/mailfence","https:\/\/www.reddit.com\/r\/Mailfence\/","https:\/\/www.linkedin.com\/company\/mailfence","https:\/\/www.instagram.com\/mailfence_\/","https:\/\/www.youtube.com\/@mailfence","https:\/\/en.wikipedia.org\/wiki\/Mailfence"]},{"@type":"Person","@id":"https:\/\/blog.mailfence.com\/de\/#\/schema\/person\/0a1800f7a6842b23ccef1107cec8c962","name":"M Salman Nadeem","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g","caption":"M Salman Nadeem"},"description":"Salman works as an Information Security Analyst for Mailfence. His areas of interest include cryptography, security architecture and design, access control, and operations security. You can follow him on LinkedIn @mohammadsalmannadeem.","sameAs":["www.linkedin.com\/in\/mohammadsalmannadeem","https:\/\/x.com\/0xSalman"],"url":"https:\/\/blog.mailfence.com\/de\/author\/msalman\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.mailfence.com\/de\/wp-json\/wp\/v2\/posts\/22090","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mailfence.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mailfence.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/de\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/de\/wp-json\/wp\/v2\/comments?post=22090"}],"version-history":[{"count":13,"href":"https:\/\/blog.mailfence.com\/de\/wp-json\/wp\/v2\/posts\/22090\/revisions"}],"predecessor-version":[{"id":103033,"href":"https:\/\/blog.mailfence.com\/de\/wp-json\/wp\/v2\/posts\/22090\/revisions\/103033"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/de\/wp-json\/wp\/v2\/media\/85569"}],"wp:attachment":[{"href":"https:\/\/blog.mailfence.com\/de\/wp-json\/wp\/v2\/media?parent=22090"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mailfence.com\/de\/wp-json\/wp\/v2\/categories?post=22090"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mailfence.com\/de\/wp-json\/wp\/v2\/tags?post=22090"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}