{"id":3722,"date":"2018-03-11T10:34:53","date_gmt":"2018-03-11T14:34:53","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/?p=3722"},"modified":"2018-03-11T10:34:53","modified_gmt":"2018-03-11T14:34:53","slug":"germany-says-hackers-infiltrated-main-government-network","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/2018\/03\/11\/germany-says-hackers-infiltrated-main-government-network\/","title":{"rendered":"Germany Says Hackers Infiltrated Main Government Network"},"content":{"rendered":"<p>Recently, hackers used software to penetrate the German government\u2019s main data network. This system is used by the chancellor\u2019s office, ministries and the Parliament. News sources are claiming a Russian hacking group supported by the Russian government is behind it. The hacking group is called Snake or also known as APT28 or Fancy Bear. However, nothing has been confirmed by the German government. The German government was a specific target and the attackers were seeking specific information.<\/p>\n<p>This attack came two years after German security officials determined that the Fancy Bear hackers were able to breach the German Parliament\u2019s data network. This led to increased security on the country\u2019s most sensitive systems. This same group has been accused of breaching computer servers of the Democratic National Committee in the United States,<\/p>\n<p>Investigators with Palo Alto Networks stated that the ones associated with Fancy Bear used \u201cmalicious emails targeting foreign affair agencies and ministries in North America and Europe.\u201d<\/p>\n<p>In the 2015 attack on the German Parliament, hackers succeeded in breaching the system and stealing 16 gigabytes of sensitive information. Patrick Sensburg, a lawmaker with the governing Conservative Party, stated that the most recent attack appeared to have a clearer target.<\/p>\n<p>Click <a href=\"https:\/\/www.nytimes.com\/2018\/03\/01\/world\/europe\/germany-hackers.html?rref=collection%2Ftimestopic%2FComputer%20Security%20(Cybersecurity)&amp;action=click&amp;contentCollection=timestopics&amp;region=stream&amp;module=stream_unit&amp;version=latest&amp;contentPlacement=3&amp;pgtype=collection\">here<\/a> for link. (Source: The New York Times)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recently, hackers used software to penetrate the German government\u2019s main data network. This system is used by the chancellor\u2019s office, ministries and the Parliament. News sources are claiming a Russian hacking group supported by the Russian government is behind it. The hacking group is called Snake or also known as APT28 or Fancy Bear. However, [&hellip;]<\/p>\n","protected":false},"author":7117,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[715997],"tags":[],"class_list":{"0":"post-3722","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-06-project-portfolio-management","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/posts\/3722","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/users\/7117"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/comments?post=3722"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/posts\/3722\/revisions"}],"predecessor-version":[{"id":3723,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/posts\/3722\/revisions\/3723"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/media?parent=3722"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/categories?post=3722"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sec701sp2018\/wp-json\/wp\/v2\/tags?post=3722"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}