{"id":9053,"date":"2020-09-16T19:34:25","date_gmt":"2020-09-16T19:34:25","guid":{"rendered":"https:\/\/aviancetechnologies.com\/blog\/china-backed-hackers-broke-into-100-firms-and-agencies-u-s-says\/"},"modified":"2020-09-16T19:34:25","modified_gmt":"2020-09-16T19:34:25","slug":"china-backed-hackers-broke-into-100-firms-and-agencies-u-s-says","status":"publish","type":"post","link":"https:\/\/aviancetechnologies.com\/blog\/china-backed-hackers-broke-into-100-firms-and-agencies-u-s-says\/","title":{"rendered":"China-Backed Hackers Broke Into 100 Firms and Agencies, U.S. Says"},"content":{"rendered":"<p>\u00a0\u00a0 <\/p>\n<p>[responsivevoice_button rate=&#8221;1\u2033 pitch=&#8221;1.2\u2033 volume=&#8221;0.8\u2033 voice=&#8221;US English Female&#8221; buttontext=&#8221;Story in Audio&#8221;]<\/p>\n<h2>China-Backed Hackers Broke Into 100 Firms and Agencies, U.S. Says<\/h2>\n<p><\/p>\n<div>\n<div class=\"css-53u6y8\">\n<p class=\"css-158dogj evys1bk0\">WASHINGTON \u2014 The Justice Department said on Wednesday that a group of hackers associated with China\u2019s main intelligence service had infiltrated more than 100 companies and organizations around the world to steal intelligence, hijack their networks and extort their victims.<\/p>\n<p class=\"css-158dogj evys1bk0\">The United States government presented the allegations in a set of three indictments unsealed on Wednesday that showed the scope and sophistication of China\u2019s attempts to unlawfully advance its economy and to become the dominant global superpower through cyberattacks. The indictments also said some of the hackers had worked with Malaysian nationals to steal and launder money through the video game industry.<\/p>\n<p class=\"css-158dogj evys1bk0\">\u201cThe Chinese government has made a deliberate choice to allow its citizens to commit computer intrusions and attacks around the world because these actors will also help the P.R.C.,\u201d Deputy Attorney General Jeffrey A. Rosen said, referring to the People\u2019s Republic of China in a news conference where he announced the charges.<\/p>\n<p class=\"css-158dogj evys1bk0\">The acting U.S. attorney for the District of Columbia, Michael R. Sherwin, said some of the perpetrators viewed their association with China as providing \u201cfree license to hack and steal across the globe.\u201d<\/p>\n<\/div>\n<aside class=\"css-ew4tgv\" aria-label=\"companion column\"\/><\/div>\n<div>\n<div class=\"css-53u6y8\">\n<p class=\"css-158dogj evys1bk0\">The hackers, Zhang Haoran, Tan Dailin, Jiang Lizhi, Qian Chuan and Fu Qiang, targeted social media and other technology companies, universities, government agencies and nonprofits, according to the indictments.<\/p>\n<p class=\"css-158dogj evys1bk0\">They had such reach partly because they used a so-called supply chain attack that enabled them to break into software companies and embed malicious code in their products. Once those products were installed in other systems, the hackers could use the code that they had planted to break in. The attack described by Justice Department officials on Wednesday was among the first supply chain attacks publicly revealed in a U.S. indictment of Chinese nationals.<\/p>\n<p class=\"css-158dogj evys1bk0\">Some of the Chinese hackers also worked with two Malaysian businessmen to use video game platforms to steal from the companies and launder illegal proceeds. The businessmen, Wong Ong Hua and Ling Yang Ching, were arrested on Monday in Malaysia, officials said.<\/p>\n<p class=\"css-158dogj evys1bk0\">The criminal computer activity and the hackers had been tracked by cyberresearchers under the group names Advanced Persistent Threat 41, Barium, Winnti, Wicked Panda and Panda Spider, officials said.<\/p>\n<p class=\"css-158dogj evys1bk0\">\u201cThey compromised video game distributors to proliferate malware, which could then be used for follow-up operations,\u201d said John Hultquist, the senior director of threat intelligence at the cybersecurity company Mandiant.<\/p>\n<\/div>\n<aside class=\"css-ew4tgv\" aria-label=\"companion column\"\/><\/div>\n<div>\n<div class=\"css-53u6y8\">\n<p class=\"css-158dogj evys1bk0\">The group known initially as Wicked Spider to researchers at CrowdStrike, the California cybersecurity firm, seemed to be hacking for profit. But starting in late 2015, there was a notable shift.<\/p>\n<p class=\"css-158dogj evys1bk0\">The group, which had been predominantly targeting gaming companies, shifted to a long list of companies in the United States, Germany, Hong Kong, Japan, South Korea and Taiwan that operated in agriculture, hospitality, chemicals, manufacturing and technology whose intellectual property would assist China\u2019s official Five-Year Plan, the nation\u2019s top-level policy blueprint.<\/p>\n<p class=\"css-158dogj evys1bk0\">Their techniques changed as well. In the past, the group was known to use similar malware across attacks, but that year its hackers started pursuing a more sophisticated set of supply chain attacks. <\/p>\n<p class=\"css-158dogj evys1bk0\">By late 2016, researchers concluded that the hackers they had known as Wicked Spider were operating at the behest of the Chinese state and changed their moniker to Wicked Panda. Panda was CrowdStrike\u2019s moniker for hacking groups that acted on orders from the Chinese government.<\/p>\n<p class=\"css-158dogj evys1bk0\">As the indictments were announced on Wednesday, researchers applauded the effort. \u201cThe United States government is starting to turn the tide on Chinese intrusion operations on Western companies and targets,\u201d said Adam Meyers, CrowdStrike\u2019s head of threat intelligence.<\/p>\n<p class=\"css-158dogj evys1bk0\">Verizon, Microsoft, Facebook and Alphabet, the parent company of Google, helped the government in its investigation.<\/p>\n<\/div>\n<aside class=\"css-ew4tgv\" aria-label=\"companion column\"\/><\/div>\n<div class=\"post-item-metadata entry-meta\">\n<p class=\"has-background has-very-light-gray-background-color\">Disclaimer: Content may be edited for style and length.\u00a0<a class=\"newsium-categories category-color-1\" href=\"https:\/\/www.nytimes.com\/2020\/09\/16\/us\/politics\/china-hackers.html\" target=\"_blank\" rel=\"noopener noreferrer\">Story Source<\/a><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0\u00a0 [responsivevoice_button rate=&#8221;1\u2033 pitch=&#8221;1.2\u2033 volume=&#8221;0.8\u2033 voice=&#8221;US English Female&#8221; buttontext=&#8221;Story in Audio&#8221;] China-Backed Hackers Broke Into 100 Firms and Agencies, U.S. Says WASHINGTON \u2014 The Justice Department said on Wednesday that a group of hackers associated with China\u2019s main intelligence service had infiltrated more than 100 companies and organizations around the world to steal intelligence, hijack &#8230; <a title=\"China-Backed Hackers Broke Into 100 Firms and Agencies, U.S. Says\" class=\"read-more\" href=\"https:\/\/aviancetechnologies.com\/blog\/china-backed-hackers-broke-into-100-firms-and-agencies-u-s-says\/\" aria-label=\"Read more about China-Backed Hackers Broke Into 100 Firms and Agencies, U.S. Says\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":9054,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1,30],"tags":[],"class_list":["post-9053","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-technology"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>China-Backed Hackers Broke Into 100 Firms and Agencies, U.S. Says - Aviance Technologies<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"China-Backed Hackers Broke Into 100 Firms and Agencies, U.S. Says - Aviance Technologies\" \/>\n<meta property=\"og:description\" content=\"\u00a0\u00a0 [responsivevoice_button rate=&#8221;1\u2033 pitch=&#8221;1.2\u2033 volume=&#8221;0.8\u2033 voice=&#8221;US English Female&#8221; buttontext=&#8221;Story in Audio&#8221;] China-Backed Hackers Broke Into 100 Firms and Agencies, U.S. Says WASHINGTON \u2014 The Justice Department said on Wednesday that a group of hackers associated with China\u2019s main intelligence service had infiltrated more than 100 companies and organizations around the world to steal intelligence, hijack ... Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/aviancetechnologies.com\/blog\/china-backed-hackers-broke-into-100-firms-and-agencies-u-s-says\/\" \/>\n<meta property=\"og:site_name\" content=\"Aviance Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-16T19:34:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/aviancetechnologies.com\/blog\/wp-content\/uploads\/2020\/09\/China-Backed-Hackers-Broke-Into-100-Firms-and-Agencies-U.S.-Says.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1050\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ATN\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ATN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/china-backed-hackers-broke-into-100-firms-and-agencies-u-s-says\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/china-backed-hackers-broke-into-100-firms-and-agencies-u-s-says\\\/\"},\"author\":{\"name\":\"ATN\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#\\\/schema\\\/person\\\/687e1451a2e1ef0b60e1759f4aeb84bc\"},\"headline\":\"China-Backed Hackers Broke Into 100 Firms and Agencies, U.S. Says\",\"datePublished\":\"2020-09-16T19:34:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/china-backed-hackers-broke-into-100-firms-and-agencies-u-s-says\\\/\"},\"wordCount\":655,\"publisher\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/china-backed-hackers-broke-into-100-firms-and-agencies-u-s-says\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/China-Backed-Hackers-Broke-Into-100-Firms-and-Agencies-U.S.-Says.jpg\",\"articleSection\":[\"NEWS\",\"TECHNOLOGY\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/china-backed-hackers-broke-into-100-firms-and-agencies-u-s-says\\\/\",\"url\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/china-backed-hackers-broke-into-100-firms-and-agencies-u-s-says\\\/\",\"name\":\"China-Backed Hackers Broke Into 100 Firms and Agencies, U.S. Says - Aviance Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/china-backed-hackers-broke-into-100-firms-and-agencies-u-s-says\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/china-backed-hackers-broke-into-100-firms-and-agencies-u-s-says\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/China-Backed-Hackers-Broke-Into-100-Firms-and-Agencies-U.S.-Says.jpg\",\"datePublished\":\"2020-09-16T19:34:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/china-backed-hackers-broke-into-100-firms-and-agencies-u-s-says\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/china-backed-hackers-broke-into-100-firms-and-agencies-u-s-says\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/china-backed-hackers-broke-into-100-firms-and-agencies-u-s-says\\\/#primaryimage\",\"url\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/China-Backed-Hackers-Broke-Into-100-Firms-and-Agencies-U.S.-Says.jpg\",\"contentUrl\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/China-Backed-Hackers-Broke-Into-100-Firms-and-Agencies-U.S.-Says.jpg\",\"width\":1050,\"height\":550},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/china-backed-hackers-broke-into-100-firms-and-agencies-u-s-says\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"China-Backed Hackers Broke Into 100 Firms and Agencies, U.S. Says\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/\",\"name\":\"Aviance Technologies\",\"description\":\"Latest Technology Trends\",\"publisher\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#organization\",\"name\":\"Aviance Technologies\",\"url\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/logo-aviance-tech-news.png\",\"contentUrl\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/logo-aviance-tech-news.png\",\"width\":217,\"height\":77,\"caption\":\"Aviance Technologies\"},\"image\":{\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/#\\\/schema\\\/person\\\/687e1451a2e1ef0b60e1759f4aeb84bc\",\"name\":\"ATN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f4c1ca1258ac9b116cff31ef81481958b0b795f6f4698e454fe2c71577aacc62?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f4c1ca1258ac9b116cff31ef81481958b0b795f6f4698e454fe2c71577aacc62?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f4c1ca1258ac9b116cff31ef81481958b0b795f6f4698e454fe2c71577aacc62?s=96&d=mm&r=g\",\"caption\":\"ATN\"},\"url\":\"https:\\\/\\\/aviancetechnologies.com\\\/blog\\\/author\\\/webmaster\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"China-Backed Hackers Broke Into 100 Firms and Agencies, U.S. Says - Aviance Technologies","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"China-Backed Hackers Broke Into 100 Firms and Agencies, U.S. Says - Aviance Technologies","og_description":"\u00a0\u00a0 [responsivevoice_button rate=&#8221;1\u2033 pitch=&#8221;1.2\u2033 volume=&#8221;0.8\u2033 voice=&#8221;US English Female&#8221; buttontext=&#8221;Story in Audio&#8221;] China-Backed Hackers Broke Into 100 Firms and Agencies, U.S. Says WASHINGTON \u2014 The Justice Department said on Wednesday that a group of hackers associated with China\u2019s main intelligence service had infiltrated more than 100 companies and organizations around the world to steal intelligence, hijack ... Read more","og_url":"https:\/\/aviancetechnologies.com\/blog\/china-backed-hackers-broke-into-100-firms-and-agencies-u-s-says\/","og_site_name":"Aviance Technologies","article_published_time":"2020-09-16T19:34:25+00:00","og_image":[{"width":1050,"height":550,"url":"https:\/\/aviancetechnologies.com\/blog\/wp-content\/uploads\/2020\/09\/China-Backed-Hackers-Broke-Into-100-Firms-and-Agencies-U.S.-Says.jpg","type":"image\/jpeg"}],"author":"ATN","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ATN","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/aviancetechnologies.com\/blog\/china-backed-hackers-broke-into-100-firms-and-agencies-u-s-says\/#article","isPartOf":{"@id":"https:\/\/aviancetechnologies.com\/blog\/china-backed-hackers-broke-into-100-firms-and-agencies-u-s-says\/"},"author":{"name":"ATN","@id":"https:\/\/aviancetechnologies.com\/blog\/#\/schema\/person\/687e1451a2e1ef0b60e1759f4aeb84bc"},"headline":"China-Backed Hackers Broke Into 100 Firms and Agencies, U.S. Says","datePublished":"2020-09-16T19:34:25+00:00","mainEntityOfPage":{"@id":"https:\/\/aviancetechnologies.com\/blog\/china-backed-hackers-broke-into-100-firms-and-agencies-u-s-says\/"},"wordCount":655,"publisher":{"@id":"https:\/\/aviancetechnologies.com\/blog\/#organization"},"image":{"@id":"https:\/\/aviancetechnologies.com\/blog\/china-backed-hackers-broke-into-100-firms-and-agencies-u-s-says\/#primaryimage"},"thumbnailUrl":"https:\/\/aviancetechnologies.com\/blog\/wp-content\/uploads\/2020\/09\/China-Backed-Hackers-Broke-Into-100-Firms-and-Agencies-U.S.-Says.jpg","articleSection":["NEWS","TECHNOLOGY"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/aviancetechnologies.com\/blog\/china-backed-hackers-broke-into-100-firms-and-agencies-u-s-says\/","url":"https:\/\/aviancetechnologies.com\/blog\/china-backed-hackers-broke-into-100-firms-and-agencies-u-s-says\/","name":"China-Backed Hackers Broke Into 100 Firms and Agencies, U.S. Says - Aviance Technologies","isPartOf":{"@id":"https:\/\/aviancetechnologies.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/aviancetechnologies.com\/blog\/china-backed-hackers-broke-into-100-firms-and-agencies-u-s-says\/#primaryimage"},"image":{"@id":"https:\/\/aviancetechnologies.com\/blog\/china-backed-hackers-broke-into-100-firms-and-agencies-u-s-says\/#primaryimage"},"thumbnailUrl":"https:\/\/aviancetechnologies.com\/blog\/wp-content\/uploads\/2020\/09\/China-Backed-Hackers-Broke-Into-100-Firms-and-Agencies-U.S.-Says.jpg","datePublished":"2020-09-16T19:34:25+00:00","breadcrumb":{"@id":"https:\/\/aviancetechnologies.com\/blog\/china-backed-hackers-broke-into-100-firms-and-agencies-u-s-says\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/aviancetechnologies.com\/blog\/china-backed-hackers-broke-into-100-firms-and-agencies-u-s-says\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/aviancetechnologies.com\/blog\/china-backed-hackers-broke-into-100-firms-and-agencies-u-s-says\/#primaryimage","url":"https:\/\/aviancetechnologies.com\/blog\/wp-content\/uploads\/2020\/09\/China-Backed-Hackers-Broke-Into-100-Firms-and-Agencies-U.S.-Says.jpg","contentUrl":"https:\/\/aviancetechnologies.com\/blog\/wp-content\/uploads\/2020\/09\/China-Backed-Hackers-Broke-Into-100-Firms-and-Agencies-U.S.-Says.jpg","width":1050,"height":550},{"@type":"BreadcrumbList","@id":"https:\/\/aviancetechnologies.com\/blog\/china-backed-hackers-broke-into-100-firms-and-agencies-u-s-says\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/aviancetechnologies.com\/blog\/"},{"@type":"ListItem","position":2,"name":"China-Backed Hackers Broke Into 100 Firms and Agencies, U.S. Says"}]},{"@type":"WebSite","@id":"https:\/\/aviancetechnologies.com\/blog\/#website","url":"https:\/\/aviancetechnologies.com\/blog\/","name":"Aviance Technologies","description":"Latest Technology Trends","publisher":{"@id":"https:\/\/aviancetechnologies.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/aviancetechnologies.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/aviancetechnologies.com\/blog\/#organization","name":"Aviance Technologies","url":"https:\/\/aviancetechnologies.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/aviancetechnologies.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/aviancetechnologies.com\/blog\/wp-content\/uploads\/2023\/05\/logo-aviance-tech-news.png","contentUrl":"https:\/\/aviancetechnologies.com\/blog\/wp-content\/uploads\/2023\/05\/logo-aviance-tech-news.png","width":217,"height":77,"caption":"Aviance Technologies"},"image":{"@id":"https:\/\/aviancetechnologies.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/aviancetechnologies.com\/blog\/#\/schema\/person\/687e1451a2e1ef0b60e1759f4aeb84bc","name":"ATN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f4c1ca1258ac9b116cff31ef81481958b0b795f6f4698e454fe2c71577aacc62?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f4c1ca1258ac9b116cff31ef81481958b0b795f6f4698e454fe2c71577aacc62?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f4c1ca1258ac9b116cff31ef81481958b0b795f6f4698e454fe2c71577aacc62?s=96&d=mm&r=g","caption":"ATN"},"url":"https:\/\/aviancetechnologies.com\/blog\/author\/webmaster\/"}]}},"_links":{"self":[{"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/posts\/9053","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/comments?post=9053"}],"version-history":[{"count":0,"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/posts\/9053\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/media\/9054"}],"wp:attachment":[{"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/media?parent=9053"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/categories?post=9053"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aviancetechnologies.com\/blog\/wp-json\/wp\/v2\/tags?post=9053"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}