{"id":93574,"date":"2025-10-01T10:01:54","date_gmt":"2025-10-01T08:01:54","guid":{"rendered":"https:\/\/ru.law\/?p=93574"},"modified":"2025-10-01T10:05:15","modified_gmt":"2025-10-01T08:05:15","slug":"phishing-angriff-auf-venus-protocol-13-millionen-im-visier","status":"publish","type":"post","link":"https:\/\/ru.law\/nl\/phishing-angriff-auf-venus-protocol-13-millionen-im-visier\/","title":{"rendered":"Phishingaanval op Venus Protocol: $13 miljoen doelwit"},"content":{"rendered":"<p>Op 2 september 2025 heeft een gebruiker van de <strong>Venus-protocollen<\/strong> Slachtoffer van een geavanceerde phishingaanval. Het incident resulteerde aanvankelijk in een verlies van ongeveer <strong>13 miljoen Amerikaanse dollars<\/strong>, maar werd grotendeels teruggedraaid dankzij een snelle reactie van het Venus-team en verschillende veiligheidspartners.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-der-angriff-social-engineering-deepfakes-und-manipulierte-plugins\">De aanval: social engineering, deepfakes en gemanipuleerde plugins<\/h3>\n\n\n\n<p>Na analyse van het incident bleek het om een doelbewust geplande social engineering-campagne te gaan. De aanvallers, die vermoedelijk banden hebben met de Noord-Koreaanse hackersgroep Lazarus, combineerden verschillende methoden, zoals phishing, deepfake-technologie en het gebruik van malware. Een gemanipuleerde Zoom-link lokte het slachtoffer naar een nepvergadering waarin een bedrieglijk echt lijkend bericht verscheen met het verzoek om een zogenaamde &quot;upgrade&quot; van de microfoon. Door onopgemerkt op dit verzoek te klikken, werd een schadelijke browserplug-in ge\u00efnstalleerd die een bekende wallet-extensie imiteerde. Dit lokte het slachtoffer ertoe een kwaadaardige transactie te ondertekenen die de daders uitgebreide toegang tot de wallet gaf. De aanvallers gebruikten deze machtigingen vervolgens om geld te lenen van de rekening van het slachtoffer en het geld onmiddellijk door te sturen naar hun eigen wallet.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-besonderheiten-des-angriffs\">Bijzonderheden van de aanval<\/h3>\n\n\n\n<p>De aanval was zeer <strong>gericht<\/strong>De aanvallers analyseerden de walletstructuur van het slachtoffer tot in detail en stemden de aanval precies af op hun posities in het Venus Protocol. Het bewijs suggereert dat <strong>Deepfake-video&#039;s<\/strong> werden gebruikt om valse identiteiten geloofwaardig te laten lijken.<\/p>\n\n\n\n<p>Een ander kenmerk: ondanks het gebruik van een <strong>Hardware-wallet<\/strong> De aanval was succesvol. De reden was de manipulatie van de frontend, waardoor het slachtoffer weliswaar correct tekende, maar onbewust een kwaadaardige transactie bevestigde.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-die-reaktion-schnelles-eingreifen-rettet-millionen\">De reactie: Snelle interventie bespaart miljoenen<\/h3>\n\n\n\n<p>Onmiddellijk nadat het incident bekend werd, waarschuwde het slachtoffer het beveiligingsbedrijf <strong>PeckShield<\/strong>, die onmiddellijk contact legde met het Venus-team.<\/p>\n\n\n\n<p>De ontwikkelaars van Venus reageerden daadkrachtig. Het protocol werd tijdelijk <strong>gepauzeerd<\/strong>om verdere schade te voorkomen. Als onderdeel van de genomen maatregelen, <strong>Account van aanvaller geforceerd geliquideerd<\/strong>zodat het eerder gestolen geld kon worden teruggevonden en aan het slachtoffer kon worden gecrediteerd.<\/p>\n\n\n\n<p>Naast Venus en PeckShield zijn er ook partners zoals <strong>Binance, Chaos Labs, Hexagate, Hypernative Labs en SlowMist<\/strong> betrokken bij noodmaatregelen.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-wichtige-sicherheitsmassnahmen\">Belangrijke veiligheidsmaatregelen<\/h3>\n\n\n\n<p>De case illustreert hoe geavanceerd hackersgroepen zoals Lazarus zijn geworden in hun aanvalsmethoden. Wat vooral kritiek is, is dat zelfs ervaren gebruikers met hardware wallets niet langer automatisch beschermd zijn als de <strong>Frontend gecompromitteerd<\/strong> is.<\/p>\n\n\n\n<p>Het wordt aanbevolen <strong>gevoelige vergaderingen niet<\/strong> boven <strong>zoom<\/strong> omdat het platform meerdere malen is misbruikt voor social engineering-aanvallen. <strong>Plugins en wallets<\/strong> uitsluitend van <strong>offici\u00eble bronnen<\/strong> ge\u00efnstalleerd \u2013 nooit via pop-ups of externe links. Een gezonde hoeveelheid <strong>scepticisme <\/strong>is ook geschikt voor &#039;semi-vertrouwde&#039; contacten, aangezien aanvallers doelbewust mensen gebruiken die niet helemaal onbekend lijken, maar die ook geen deel uitmaken van hun directe omgeving. <strong>Hardware wallets<\/strong> blijft nuttig, maar vereist speciale aandacht voor elke individuele transactie.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-fazit\">Conclusie<\/h3>\n\n\n\n<p>De phishingaanval op het Venus Protocol laat op indrukwekkende wijze zien hoe professioneel en technisch geavanceerd hackersgroepen zijn geworden. Het terughalen van de gestolen gelden is een zeldzame uitzondering en alleen te danken aan de geco\u00f6rdineerde acties van verschillende beveiligingsteams.<\/p>\n\n\n\n<p>De belangrijkste bevinding: <strong>Technische beveiliging alleen is niet voldoende<\/strong>Menselijke factoren zoals vertrouwen, routine en onzorgvuldigheid vormen nog steeds de basis voor aanvallen. Hierdoor is social engineering de grootste bedreiging in de DeFi-wereld.<\/p>","protected":false},"excerpt":{"rendered":"<p>Am 2. September 2025 wurde ein Nutzer des Venus Protocols Opfer eines hochentwickelten Phishing-Angriffs. Der Vorfall f\u00fchrte zun\u00e4chst zu einem Verlust von rund 13 Millionen [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":93576,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[1220],"tags":[1371,1374,1373,1370,1372],"class_list":["post-93574","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bank-und-kapitalmarktrecht","tag-deepfake-technologie","tag-hacker","tag-lazarus","tag-phishing-angriff","tag-schadsoftware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Phishing-Angriff auf Venus Protocol: $13 Millionen im Visier - R&amp;U<\/title>\n<meta name=\"description\" content=\"BMW l\u00f6st weltweit einen R\u00fcckruf von Hunderttausenden Fahrzeugen aus \u2013 Grund ist ein Defekt am Starter. Es kann sogar zu Brand f\u00fchren.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ru.law\/nl\/phishing-angriff-auf-venus-protocol-13-millionen-im-visier\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing-Angriff auf Venus Protocol: $13 Millionen im Visier\" \/>\n<meta property=\"og:description\" content=\"BMW l\u00f6st weltweit einen R\u00fcckruf von Hunderttausenden Fahrzeugen aus \u2013 Grund ist ein Defekt am Starter. Es kann sogar zu Brand f\u00fchren.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ru.law\/nl\/phishing-angriff-auf-venus-protocol-13-millionen-im-visier\/\" \/>\n<meta property=\"og:site_name\" content=\"R&amp;U\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RogertUlbrich\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-01T08:01:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-01T08:05:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ru.law\/wp-content\/uploads\/2025\/10\/AdobeStock_560329253-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ommatic\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@RogertUlbrich\" \/>\n<meta name=\"twitter:site\" content=\"@RogertUlbrich\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ru.law\\\/phishing-angriff-auf-venus-protocol-13-millionen-im-visier\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ru.law\\\/phishing-angriff-auf-venus-protocol-13-millionen-im-visier\\\/\"},\"author\":{\"name\":\"ommatic\",\"@id\":\"https:\\\/\\\/ru.law\\\/#\\\/schema\\\/person\\\/c89a1a1d9667e53bc3eea7493e437f13\"},\"headline\":\"Phishing-Angriff auf Venus Protocol: $13 Millionen im Visier\",\"datePublished\":\"2025-10-01T08:01:54+00:00\",\"dateModified\":\"2025-10-01T08:05:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ru.law\\\/phishing-angriff-auf-venus-protocol-13-millionen-im-visier\\\/\"},\"wordCount\":541,\"publisher\":{\"@id\":\"https:\\\/\\\/ru.law\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/ru.law\\\/phishing-angriff-auf-venus-protocol-13-millionen-im-visier\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ru.law\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/AdobeStock_560329253-scaled.jpeg\",\"keywords\":[\"Deepfake-Technologie\",\"Hacker\",\"Lazarus\",\"Phishing-Angriff\",\"Schadsoftware\"],\"articleSection\":[\"Bank- und Kapitalmarktrecht\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ru.law\\\/phishing-angriff-auf-venus-protocol-13-millionen-im-visier\\\/\",\"url\":\"https:\\\/\\\/ru.law\\\/phishing-angriff-auf-venus-protocol-13-millionen-im-visier\\\/\",\"name\":\"Phishing-Angriff auf Venus Protocol: $13 Millionen im Visier - R&amp;U\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ru.law\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/ru.law\\\/phishing-angriff-auf-venus-protocol-13-millionen-im-visier\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/ru.law\\\/phishing-angriff-auf-venus-protocol-13-millionen-im-visier\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ru.law\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/AdobeStock_560329253-scaled.jpeg\",\"datePublished\":\"2025-10-01T08:01:54+00:00\",\"dateModified\":\"2025-10-01T08:05:15+00:00\",\"description\":\"BMW l\u00f6st weltweit einen R\u00fcckruf von Hunderttausenden Fahrzeugen aus \u2013 Grund ist ein Defekt am Starter. Es kann sogar zu Brand f\u00fchren.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ru.law\\\/phishing-angriff-auf-venus-protocol-13-millionen-im-visier\\\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ru.law\\\/phishing-angriff-auf-venus-protocol-13-millionen-im-visier\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/ru.law\\\/phishing-angriff-auf-venus-protocol-13-millionen-im-visier\\\/#primaryimage\",\"url\":\"https:\\\/\\\/ru.law\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/AdobeStock_560329253-scaled.jpeg\",\"contentUrl\":\"https:\\\/\\\/ru.law\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/AdobeStock_560329253-scaled.jpeg\",\"width\":2560,\"height\":1707,\"caption\":\"System hacked warning alert on notebook (Laptop). Cyber attack on computer network, Virus, Spyware, Malware or Malicious software. Cyber security and cybercrime. Compromised information internet.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ru.law\\\/phishing-angriff-auf-venus-protocol-13-millionen-im-visier\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/ru.law\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Phishing-Angriff auf Venus Protocol: $13 Millionen im Visier\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ru.law\\\/#website\",\"url\":\"https:\\\/\\\/ru.law\\\/\",\"name\":\"R&U\",\"description\":\"Verbraucheranw\u00e4lte\",\"publisher\":{\"@id\":\"https:\\\/\\\/ru.law\\\/#organization\"},\"alternateName\":\"Rogert & Ulbrich\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ru.law\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/ru.law\\\/#organization\",\"name\":\"Kanzlei Rogert & Ulbrich\",\"url\":\"https:\\\/\\\/ru.law\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/ru.law\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/ru.law\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/logo-ru-law.svg\",\"contentUrl\":\"https:\\\/\\\/ru.law\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/logo-ru-law.svg\",\"width\":992,\"height\":259,\"caption\":\"Kanzlei Rogert & Ulbrich\"},\"image\":{\"@id\":\"https:\\\/\\\/ru.law\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/RogertUlbrich\\\/\",\"https:\\\/\\\/x.com\\\/RogertUlbrich\",\"https:\\\/\\\/www.instagram.com\\\/rogertulbrich\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/rogert-ulbrich\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCganCgpvwpPFqMFf1vVmG2A\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ru.law\\\/#\\\/schema\\\/person\\\/c89a1a1d9667e53bc3eea7493e437f13\",\"name\":\"ommatic\",\"url\":\"https:\\\/\\\/ru.law\\\/nl\\\/author\\\/ommatic\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Phishing-Angriff auf Venus Protocol: $13 Millionen im Visier - R&amp;U","description":"BMW l\u00f6st weltweit einen R\u00fcckruf von Hunderttausenden Fahrzeugen aus \u2013 Grund ist ein Defekt am Starter. Es kann sogar zu Brand f\u00fchren.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ru.law\/nl\/phishing-angriff-auf-venus-protocol-13-millionen-im-visier\/","og_locale":"nl_NL","og_type":"article","og_title":"Phishing-Angriff auf Venus Protocol: $13 Millionen im Visier","og_description":"BMW l\u00f6st weltweit einen R\u00fcckruf von Hunderttausenden Fahrzeugen aus \u2013 Grund ist ein Defekt am Starter. Es kann sogar zu Brand f\u00fchren.","og_url":"https:\/\/ru.law\/nl\/phishing-angriff-auf-venus-protocol-13-millionen-im-visier\/","og_site_name":"R&amp;U","article_publisher":"https:\/\/www.facebook.com\/RogertUlbrich\/","article_published_time":"2025-10-01T08:01:54+00:00","article_modified_time":"2025-10-01T08:05:15+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/ru.law\/wp-content\/uploads\/2025\/10\/AdobeStock_560329253-scaled.jpeg","type":"image\/jpeg"}],"author":"ommatic","twitter_card":"summary_large_image","twitter_creator":"@RogertUlbrich","twitter_site":"@RogertUlbrich","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ru.law\/phishing-angriff-auf-venus-protocol-13-millionen-im-visier\/#article","isPartOf":{"@id":"https:\/\/ru.law\/phishing-angriff-auf-venus-protocol-13-millionen-im-visier\/"},"author":{"name":"ommatic","@id":"https:\/\/ru.law\/#\/schema\/person\/c89a1a1d9667e53bc3eea7493e437f13"},"headline":"Phishing-Angriff auf Venus Protocol: $13 Millionen im Visier","datePublished":"2025-10-01T08:01:54+00:00","dateModified":"2025-10-01T08:05:15+00:00","mainEntityOfPage":{"@id":"https:\/\/ru.law\/phishing-angriff-auf-venus-protocol-13-millionen-im-visier\/"},"wordCount":541,"publisher":{"@id":"https:\/\/ru.law\/#organization"},"image":{"@id":"https:\/\/ru.law\/phishing-angriff-auf-venus-protocol-13-millionen-im-visier\/#primaryimage"},"thumbnailUrl":"https:\/\/ru.law\/wp-content\/uploads\/2025\/10\/AdobeStock_560329253-scaled.jpeg","keywords":["Deepfake-Technologie","Hacker","Lazarus","Phishing-Angriff","Schadsoftware"],"articleSection":["Bank- und Kapitalmarktrecht"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/ru.law\/phishing-angriff-auf-venus-protocol-13-millionen-im-visier\/","url":"https:\/\/ru.law\/phishing-angriff-auf-venus-protocol-13-millionen-im-visier\/","name":"Phishing-Angriff auf Venus Protocol: $13 Millionen im Visier - R&amp;U","isPartOf":{"@id":"https:\/\/ru.law\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ru.law\/phishing-angriff-auf-venus-protocol-13-millionen-im-visier\/#primaryimage"},"image":{"@id":"https:\/\/ru.law\/phishing-angriff-auf-venus-protocol-13-millionen-im-visier\/#primaryimage"},"thumbnailUrl":"https:\/\/ru.law\/wp-content\/uploads\/2025\/10\/AdobeStock_560329253-scaled.jpeg","datePublished":"2025-10-01T08:01:54+00:00","dateModified":"2025-10-01T08:05:15+00:00","description":"BMW l\u00f6st weltweit einen R\u00fcckruf von Hunderttausenden Fahrzeugen aus \u2013 Grund ist ein Defekt am Starter. Es kann sogar zu Brand f\u00fchren.","breadcrumb":{"@id":"https:\/\/ru.law\/phishing-angriff-auf-venus-protocol-13-millionen-im-visier\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ru.law\/phishing-angriff-auf-venus-protocol-13-millionen-im-visier\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/ru.law\/phishing-angriff-auf-venus-protocol-13-millionen-im-visier\/#primaryimage","url":"https:\/\/ru.law\/wp-content\/uploads\/2025\/10\/AdobeStock_560329253-scaled.jpeg","contentUrl":"https:\/\/ru.law\/wp-content\/uploads\/2025\/10\/AdobeStock_560329253-scaled.jpeg","width":2560,"height":1707,"caption":"System hacked warning alert on notebook (Laptop). Cyber attack on computer network, Virus, Spyware, Malware or Malicious software. Cyber security and cybercrime. Compromised information internet."},{"@type":"BreadcrumbList","@id":"https:\/\/ru.law\/phishing-angriff-auf-venus-protocol-13-millionen-im-visier\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/ru.law\/"},{"@type":"ListItem","position":2,"name":"Phishing-Angriff auf Venus Protocol: $13 Millionen im Visier"}]},{"@type":"WebSite","@id":"https:\/\/ru.law\/#website","url":"https:\/\/ru.law\/","name":"R&amp;U","description":"Consumentenadvocaten","publisher":{"@id":"https:\/\/ru.law\/#organization"},"alternateName":"Rogert & Ulbrich","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ru.law\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/ru.law\/#organization","name":"Advocatenkantoor Rogert &amp; Ulbrich","url":"https:\/\/ru.law\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/ru.law\/#\/schema\/logo\/image\/","url":"https:\/\/ru.law\/wp-content\/uploads\/2020\/12\/logo-ru-law.svg","contentUrl":"https:\/\/ru.law\/wp-content\/uploads\/2020\/12\/logo-ru-law.svg","width":992,"height":259,"caption":"Kanzlei Rogert & Ulbrich"},"image":{"@id":"https:\/\/ru.law\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/RogertUlbrich\/","https:\/\/x.com\/RogertUlbrich","https:\/\/www.instagram.com\/rogertulbrich\/","https:\/\/www.linkedin.com\/company\/rogert-ulbrich\/","https:\/\/www.youtube.com\/channel\/UCganCgpvwpPFqMFf1vVmG2A"]},{"@type":"Person","@id":"https:\/\/ru.law\/#\/schema\/person\/c89a1a1d9667e53bc3eea7493e437f13","name":"ommatisch","url":"https:\/\/ru.law\/nl\/author\/ommatic\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/ru.law\/wp-content\/uploads\/2025\/10\/AdobeStock_560329253-scaled.jpeg",2560,1707,false],"thumbnail":["https:\/\/ru.law\/wp-content\/uploads\/2025\/10\/AdobeStock_560329253-scaled.jpeg",128,85,false],"medium":["https:\/\/ru.law\/wp-content\/uploads\/2025\/10\/AdobeStock_560329253-scaled.jpeg",2560,1707,false],"medium_large":["https:\/\/ru.law\/wp-content\/uploads\/2025\/10\/AdobeStock_560329253-768x512.jpeg",768,512,true],"large":["https:\/\/ru.law\/wp-content\/uploads\/2025\/10\/AdobeStock_560329253-scaled.jpeg",2560,1707,false],"1536x1536":["https:\/\/ru.law\/wp-content\/uploads\/2025\/10\/AdobeStock_560329253-1536x1024.jpeg",1536,1024,true],"2048x2048":["https:\/\/ru.law\/wp-content\/uploads\/2025\/10\/AdobeStock_560329253-2048x1365.jpeg",2048,1365,true],"trp-custom-language-flag":["https:\/\/ru.law\/wp-content\/uploads\/2025\/10\/AdobeStock_560329253-18x12.jpeg",18,12,true]},"uagb_author_info":{"display_name":"ommatic","author_link":"https:\/\/ru.law\/nl\/author\/ommatic\/"},"uagb_comment_info":0,"uagb_excerpt":"Am 2. September 2025 wurde ein Nutzer des Venus Protocols Opfer eines hochentwickelten Phishing-Angriffs. Der Vorfall f\u00fchrte zun\u00e4chst zu einem Verlust von rund 13 Millionen [&hellip;]","_links":{"self":[{"href":"https:\/\/ru.law\/nl\/wp-json\/wp\/v2\/posts\/93574","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ru.law\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ru.law\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ru.law\/nl\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/ru.law\/nl\/wp-json\/wp\/v2\/comments?post=93574"}],"version-history":[{"count":0,"href":"https:\/\/ru.law\/nl\/wp-json\/wp\/v2\/posts\/93574\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ru.law\/nl\/wp-json\/wp\/v2\/media\/93576"}],"wp:attachment":[{"href":"https:\/\/ru.law\/nl\/wp-json\/wp\/v2\/media?parent=93574"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ru.law\/nl\/wp-json\/wp\/v2\/categories?post=93574"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ru.law\/nl\/wp-json\/wp\/v2\/tags?post=93574"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}