{"id":10698,"date":"2025-01-13T10:33:21","date_gmt":"2025-01-13T09:33:21","guid":{"rendered":"https:\/\/planit.legal\/?p=10698"},"modified":"2025-03-11T11:19:50","modified_gmt":"2025-03-11T10:19:50","slug":"what-to-do-if-my-server-has-been-hacked","status":"publish","type":"post","link":"https:\/\/planit.legal\/en\/what-to-do-if-my-server-has-been-hacked\/","title":{"rendered":"What to do if my server has been hacked?"},"content":{"rendered":"\n<p><strong>Few terms are as present in the news, provoke as much discomfort, and yet fail to elicit suitable reactions as much as hacking and being hacked. Hacking sounds dangerous, but it probably won\u2019t happen to me. Because hacking, whatever it actually is, only happens to those who are worth targeting, like political parties or politicians, for example. And probably, there isn\u2019t much one can do when these digital attacks suddenly strike from abroad.<\/strong><\/p>\n\n\n\n<p><strong>It\u2019s time to dispel the myths surrounding hacking and forge a clear roadmap. Whether for individuals, businesses, or authorities, it is dangerous to leave the door wide open in the digital world when leaving the house.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">1. How can I tell if my server has been hacked?<\/h2>\n\n\n\n<p>Every appropriate response or prevention starts with knowing that an incident has occurred. In order to be able to notice that a hacker attack has occurred, it\u2019s important to be aware that the attack may not always be immediately obvious or clearly recognizable. Noticing requires a basic understanding and a sensitivity to warning signals.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>1.1 Basic Understanding<\/strong><\/h4>\n\n\n\n<p>Since the 1970s, hacking has been understood as overcoming security barriers, increasingly with the goal of infiltrating digital systems. This activity is not only considered in a negative sense. Hacking with the goal to identify security flaws, for example through organizations like the Chaos Computer Club, may be seen positively. Hacking therefore does not imply a specific hostile or friendly intention. As no particular methods are required, the known techniques are already countless (e.g., cross-site scripting or SQL injection). Finally, the consequences are also manifold. For example, data, software, accounts, or entire IT systems can be affected in various ways. The complexity and societal significance of cybersecurity in Germany are best illustrated by referring to <a href=\"https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Publikationen\/Lageberichte\/Lagebericht2024.pdf?__blob=publicationFile&amp;v=5\" target=\"_blank\" rel=\"noreferrer noopener\">reports from the BSI (Federal Office for Information Security)<\/a>, <a href=\"https:\/\/www.bitkom.org\/Presse\/Presseinformation\/Bitkom-zum-BSI-Jahresbericht\" target=\"_blank\" rel=\"noreferrer noopener\">Bitkom press releases<\/a>, or the <a href=\"https:\/\/commercial.allianz.com\/content\/dam\/onemarketing\/commercial\/commercial\/reports\/Allianz-Risk-Barometer-2024.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Allianz Risk Barometer.<\/a><\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>1. 2 Warning Signals for a Hacked Server<\/strong><\/h4>\n\n\n\n<p>Highest vigilance and caution are required. Every suspicion and irregularity should be investigated. Quick action is necessary. The following anomalies should be considered as warning signals for a hacked server:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Unusual server traffic<\/li><li>Unusual login attempts and registration activities<\/li><li>Unusual system performance and slow response times<\/li><li>Changed or unknown files on the server<\/li><li>Unusual changes to databases or other stored data<\/li><li>Messages or notifications from third parties<\/li><\/ul>\n\n\n\n<p>Each of these warning signals allows to identify specific incidents (for preventive measures, see section 4). In larger organizations, methods to check these signals should be integrated in a larger prevention plan. This plan should be regularly reviewed and updated. It is essential to determine reactions in case the signals show any abnormality to ensure operational readiness, even if just a few individuals feel uneasy.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">2. How do I respond if my server has been hacked?<\/h2>\n\n\n\n<p>If your server has been hacked, it is important to act quickly and thoughtfully, of course. However, it is also crucial to remain calm and first analyze the situation. Whether and what kind of damage occurs largely depends on the appropriateness of your reaction. Nevertheless, you should start the subsequent actions even before doubts that your server has been hacked are fully dispelled. Additionally, legal (reporting) obligations must be fulfilled, some within a few days, and immediate and transparent external communication is advisable.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>2.1 Internal Measures<\/strong><\/h4>\n\n\n\n<p>The following list outlines general steps to take. The common goal of the measures is to identify the exact extent of the hack, cut off an ongoing hacker\u2019s access to your server, and minimize the consequences of the hack. It is crucial to adjust your response based on the specific situation and possibly prioritize actions. Support from an IT expert is absolutely necessary. Points of contact and direct communication channels should be defined in advance.<\/p>\n\n\n\n<p><strong>These measures can help to end the hacker\u2019s access to your server:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Disconnect the server from the network (unplug network cables or deactivate network connections) to prevent the hacker from causing further damage.<\/li><li>Reset passwords and means of any multi-factor authentication (devices and applications).<\/li><\/ol>\n\n\n\n<p><strong>These measures can help to reduce the effects of the attack:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Review the access and error logs to gather information on the IP addresses that accessed the server and about the actions that have been taken from these IP addresses.<\/li><li>Use reliable tools to check the server for malware or other malicious software. A manual investigation can identify backdoor programs that might not be easy to identify.<\/li><li>Conduct a detailed forensic investigation to understand how the hacker infiltrated the system and which systems and data may have been affected.<\/li><li>If necessary, completely reinstall the server to ensure no backdoor programs or other malicious code remain. Ideally, you can restore your data from a clean, uncompromised backup.<\/li><\/ol>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>2.2 Legal Obligations<\/strong><\/h4>\n\n\n\n<p>In addition to internal measures, you may be subject to legal (reporting) obligations. The following obligations are listed abstractly and as examples. Specific obligations can only be determined through an individual assessment. Regarding the assessment, support from an internal legal department or external legal advice is essential.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Data Breach:<\/strong> According to Article 33 of the GDPR, you are generally required to document and report a data breach to the relevant supervisory authority within 72 hours if personal data is affected, such as by deletion, modification, or transmission. Nevertheless, there is no reporting obligation if the breach is unlikely to result in any risk to the rights and freedoms of natural persons. The risk assessment is further explained in the <a href=\"https:\/\/www.edpb.europa.eu\/system\/files\/2023-04\/edpb_guidelines_202209_personal_data_breach_notification_v2.0_en.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">guidelines of the European Data Protection Board<\/a>.<\/li><li><strong>Critical Infrastructure:<\/strong> Under Section 8b, paragraph 4 of the BSI Act (in its current version), operators of critical infrastructure must report significant disruptions to information technology systems that affect the functionality of critical infrastructure to the Federal Office for Information Security (BSI).<\/li><li><strong>Information Society Services:<\/strong> Under Section 8c, paragraph 3 of the BSI Act (in its current version), information society services must report any security incidents with significant impacts to the BSI. In the <a href=\"https:\/\/www.bsi.bund.de\/DE\/Themen\/Regulierte-Wirtschaft\/Weitere_regulierte_Unternehmen\/Anbieter_digitaler_Dienste\/FAQ\/Meldepflicht\/faq_dsp_meldepflicht_node.html\" target=\"_blank\" rel=\"noreferrer noopener\">BSI&#8217;s FAQ<\/a> on the regulation of information society services, this reporting obligation is explained in more detail.<\/li><li><strong>Payment Service Providers:<\/strong> Under Section 53, paragraph 2 of the Payment Services Supervision Act, a payment service provider must submit an annual assessment of operational and security-related risks associated with the payment services you provide. The Federal Financial Supervisory Authority has provided a <a href=\"https:\/\/www.bafin.de\/SharedDocs\/Veroeffentlichungen\/DE\/Rundschreiben\/2024\/rs_Rundschreiben_05_24.html;jsessionid=825679A5F47270C384830A9A980F891E.internet972?nn=19659504\" target=\"_blank\" rel=\"noreferrer noopener\">template<\/a> for this assessment.<\/li><\/ul>\n\n\n\n<p>Additionally, you may file a criminal complaint, which may initiate a criminal investigation. These <a href=\"https:\/\/www.polizei.de\/Polizei\/DE\/Einrichtungen\/ZAC\/zac_node.html\" target=\"_blank\" rel=\"noreferrer noopener\">Cybercrime Contact Points<\/a> offer support in this regard.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>2.3 Further External Communication<\/strong><\/h4>\n\n\n\n<p>Finally and independently of legal obligations, appropriate external communication is advisable. Especially if accounts or data from customers or other business partners are directly affected by an attack, immediate and transparent information on the attack and your measures will help to build trust. Regarding the number of hacker attacks occurring, it is not the fact that you have been hacked that affects your reputation. How you and your IT security are perceived in this case rather depends on how you manage and communicate the situation. A clear communication strategy is required.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3. Digression: Further Aspects if an Account has been Hacked<\/h2>\n\n\n\n<p>The previous descriptions refer to a hacked server. Warning signals and measures may differ, though, if the hacking has impaired a personal account, such as an email account, without affecting the entire IT system. Warning signals for a hacked account may include registrations from unknown devices, changes of access data or unusual activities within the account, such as sent emails that you don\u2019t know. The key question for an appropriate response is whether you can still access your account. If access is still possible, it is especially important to reset the passwords. For further responses, refer to the <a href=\"https:\/\/www.bsi.bund.de\/DE\/Themen\/Verbraucherinnen-und-Verbraucher\/Cyber-Sicherheitslage\/Methoden-der-Cyber-Kriminalitaet\/Identitaetsdiebstahl\/Hilfe-fuer-Betroffene\/hilfe-fuer-betroffene_node.html\" target=\"_blank\" rel=\"noreferrer noopener\">publication from the Federal Office for Information Security<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">4. How can I prevent my server from being hacked?<\/h2>\n\n\n\n<p>Absolute protection against hacker attacks does not exist. However, to minimize the chances of success for these attacks, you should not only be aware of warning signals and respond appropriately in the event of an attack but also carry out regular prevention measures. It is important to adapt the following suggestions to your specific situation and design your own infrastructure.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Use robust security solutions like firewalls and intrusion detection systems to detect and block unauthorized access early.<\/li><li>Perform regular software updates to close known security gaps.<\/li><li>Conduct regular security checks and penetration tests to identify potential vulnerabilities in your system before a hacker can exploit them.<\/li><li>Provide training so that your employees can recognize warning signals and take appropriate actions.<\/li><li>Set up security alerts to foster security competence and awareness at critical points.<\/li><li>Grant access to the server only to necessary users and processes.<\/li><li>Perform regular backups to ensure the highest possible data security.<\/li><\/ul>\n\n\n\n<p>Digression: There are also specific measures for preventing hacker attacks on accounts, which are covered in a <a href=\"https:\/\/www.bsi.bund.de\/DE\/Themen\/Verbraucherinnen-und-Verbraucher\/Cyber-Sicherheitslage\/Methoden-der-Cyber-Kriminalitaet\/Identitaetsdiebstahl\/Schutzmassnahmen\/schutzmassnahmen_node.html\" target=\"_blank\" rel=\"noreferrer noopener\">publication from the Federal Office for Information Security<\/a>.<\/p>\n\n\n\n<div style=\"height:45px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/planit.legal\/wp-content\/uploads\/2024\/11\/pl-lasse-1024x683.jpg\" alt=\"lasse kamin planit legal\" class=\"wp-image-10652 size-full\" srcset=\"https:\/\/planit.legal\/wp-content\/uploads\/2024\/11\/pl-lasse-1024x683.jpg 1024w, https:\/\/planit.legal\/wp-content\/uploads\/2024\/11\/pl-lasse-300x200.jpg 300w, https:\/\/planit.legal\/wp-content\/uploads\/2024\/11\/pl-lasse-768x512.jpg 768w, https:\/\/planit.legal\/wp-content\/uploads\/2024\/11\/pl-lasse-1536x1024.jpg 1536w, https:\/\/planit.legal\/wp-content\/uploads\/2024\/11\/pl-lasse-2048x1366.jpg 2048w, https:\/\/planit.legal\/wp-content\/uploads\/2024\/11\/pl-lasse-1200x800.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/planit.legal\/en\/team#lasse-kamin\" target=\"_blank\" rel=\"noreferrer noopener\">Lasse Kamin<\/a><\/h3>\n\n\n\n<p><strong>Lawyer<\/strong><\/p>\n\n\n\n<p>Email: <a href=\"mailto:lasse.kamin@planit.legal\" target=\"_blank\" rel=\"noreferrer noopener\">lasse.kamin@planit.legal<\/a><br>Phone: +49 (0) 40 609 44 190<\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Few terms are as present in the news, provoke as much discomfort, and yet fail to elicit suitable reactions as much as hacking and being hacked. Hacking sounds dangerous, but it probably won\u2019t happen to me. Because hacking, whatever it actually is, only happens to those who are worth targeting, like political parties or politicians, [&hellip;]<\/p>\n","protected":false},"author":40,"featured_media":10691,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[31,37,378],"tags":[427],"class_list":["post-10698","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-security","category-general-data-protection-regulation","category-what-to-do-if","tag-hacking-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What to do if my server has been hacked? - PLANIT\/\/LEGAL<\/title>\n<meta name=\"description\" content=\"It\u2019s time to dispel the myths surrounding hacking and forge a clear roadmap. Read more in our blog article.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/planit.legal\/en\/what-to-do-if-my-server-has-been-hacked\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What to do if my server has been hacked? - PLANIT\/\/LEGAL\" \/>\n<meta property=\"og:description\" content=\"It\u2019s time to dispel the myths surrounding hacking and forge a clear roadmap. Read more in our blog article.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/planit.legal\/en\/what-to-do-if-my-server-has-been-hacked\/\" \/>\n<meta property=\"og:site_name\" content=\"PLANIT\/\/LEGAL\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-13T09:33:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-11T10:19:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/planit.legal\/wp-content\/uploads\/2025\/01\/Blogbeitrag_Was-tun-wenn-mein-Server-gehackt-wurde-1-e1736497835329-1024x591.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"591\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Lasse Kamin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lasse Kamin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/planit.legal\/en\/what-to-do-if-my-server-has-been-hacked\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/planit.legal\/en\/what-to-do-if-my-server-has-been-hacked\/\"},\"author\":{\"name\":\"Lasse Kamin\",\"@id\":\"https:\/\/legal-test.planit.legal\/#\/schema\/person\/7eff3e9b2534f3f170ec260c1a1c1243\"},\"headline\":\"What to do if my server has been hacked?\",\"datePublished\":\"2025-01-13T09:33:21+00:00\",\"dateModified\":\"2025-03-11T10:19:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/planit.legal\/en\/what-to-do-if-my-server-has-been-hacked\/\"},\"wordCount\":1480,\"image\":{\"@id\":\"https:\/\/planit.legal\/en\/what-to-do-if-my-server-has-been-hacked\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/planit.legal\/wp-content\/uploads\/2025\/01\/Blogbeitrag_Was-tun-wenn-mein-Server-gehackt-wurde-1-e1736497835329.png\",\"keywords\":[\"Hacking\"],\"articleSection\":[\"Data Security\",\"General Data Protection Regulation\",\"What to do if\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/planit.legal\/en\/what-to-do-if-my-server-has-been-hacked\/\",\"url\":\"https:\/\/planit.legal\/en\/what-to-do-if-my-server-has-been-hacked\/\",\"name\":\"What to do if my server has been hacked? - PLANIT\/\/LEGAL\",\"isPartOf\":{\"@id\":\"https:\/\/legal-test.planit.legal\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/planit.legal\/en\/what-to-do-if-my-server-has-been-hacked\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/planit.legal\/en\/what-to-do-if-my-server-has-been-hacked\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/planit.legal\/wp-content\/uploads\/2025\/01\/Blogbeitrag_Was-tun-wenn-mein-Server-gehackt-wurde-1-e1736497835329.png\",\"datePublished\":\"2025-01-13T09:33:21+00:00\",\"dateModified\":\"2025-03-11T10:19:50+00:00\",\"author\":{\"@id\":\"https:\/\/legal-test.planit.legal\/#\/schema\/person\/7eff3e9b2534f3f170ec260c1a1c1243\"},\"description\":\"It\u2019s time to dispel the myths surrounding hacking and forge a clear roadmap. Read more in our blog article.\",\"breadcrumb\":{\"@id\":\"https:\/\/planit.legal\/en\/what-to-do-if-my-server-has-been-hacked\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/planit.legal\/en\/what-to-do-if-my-server-has-been-hacked\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/planit.legal\/en\/what-to-do-if-my-server-has-been-hacked\/#primaryimage\",\"url\":\"https:\/\/planit.legal\/wp-content\/uploads\/2025\/01\/Blogbeitrag_Was-tun-wenn-mein-Server-gehackt-wurde-1-e1736497835329.png\",\"contentUrl\":\"https:\/\/planit.legal\/wp-content\/uploads\/2025\/01\/Blogbeitrag_Was-tun-wenn-mein-Server-gehackt-wurde-1-e1736497835329.png\",\"width\":3555,\"height\":2053,\"caption\":\"was tun, wenn mein Server gehackt wurde\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/planit.legal\/en\/what-to-do-if-my-server-has-been-hacked\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\",\"item\":\"https:\/\/planit.legal\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"General Data Protection Regulation\",\"item\":\"https:\/\/planit.legal\/en\/category\/general-data-protection-regulation\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What to do if my server has been hacked?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/legal-test.planit.legal\/#website\",\"url\":\"https:\/\/legal-test.planit.legal\/\",\"name\":\"PLANIT\/\/LEGAL\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/legal-test.planit.legal\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/legal-test.planit.legal\/#\/schema\/person\/7eff3e9b2534f3f170ec260c1a1c1243\",\"name\":\"Lasse Kamin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/legal-test.planit.legal\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/928d4d87d5ae8c8d2549bf07f86f324b43d9b62b5dec3014a6e627b9993ea1fa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/928d4d87d5ae8c8d2549bf07f86f324b43d9b62b5dec3014a6e627b9993ea1fa?s=96&d=mm&r=g\",\"caption\":\"Lasse Kamin\"},\"url\":\"https:\/\/planit.legal\/en\/author\/lkamin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What to do if my server has been hacked? - PLANIT\/\/LEGAL","description":"It\u2019s time to dispel the myths surrounding hacking and forge a clear roadmap. Read more in our blog article.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/planit.legal\/en\/what-to-do-if-my-server-has-been-hacked\/","og_locale":"en_US","og_type":"article","og_title":"What to do if my server has been hacked? - PLANIT\/\/LEGAL","og_description":"It\u2019s time to dispel the myths surrounding hacking and forge a clear roadmap. Read more in our blog article.","og_url":"https:\/\/planit.legal\/en\/what-to-do-if-my-server-has-been-hacked\/","og_site_name":"PLANIT\/\/LEGAL","article_published_time":"2025-01-13T09:33:21+00:00","article_modified_time":"2025-03-11T10:19:50+00:00","og_image":[{"width":1024,"height":591,"url":"https:\/\/planit.legal\/wp-content\/uploads\/2025\/01\/Blogbeitrag_Was-tun-wenn-mein-Server-gehackt-wurde-1-e1736497835329-1024x591.png","type":"image\/png"}],"author":"Lasse Kamin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lasse Kamin","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/planit.legal\/en\/what-to-do-if-my-server-has-been-hacked\/#article","isPartOf":{"@id":"https:\/\/planit.legal\/en\/what-to-do-if-my-server-has-been-hacked\/"},"author":{"name":"Lasse Kamin","@id":"https:\/\/legal-test.planit.legal\/#\/schema\/person\/7eff3e9b2534f3f170ec260c1a1c1243"},"headline":"What to do if my server has been hacked?","datePublished":"2025-01-13T09:33:21+00:00","dateModified":"2025-03-11T10:19:50+00:00","mainEntityOfPage":{"@id":"https:\/\/planit.legal\/en\/what-to-do-if-my-server-has-been-hacked\/"},"wordCount":1480,"image":{"@id":"https:\/\/planit.legal\/en\/what-to-do-if-my-server-has-been-hacked\/#primaryimage"},"thumbnailUrl":"https:\/\/planit.legal\/wp-content\/uploads\/2025\/01\/Blogbeitrag_Was-tun-wenn-mein-Server-gehackt-wurde-1-e1736497835329.png","keywords":["Hacking"],"articleSection":["Data Security","General Data Protection Regulation","What to do if"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/planit.legal\/en\/what-to-do-if-my-server-has-been-hacked\/","url":"https:\/\/planit.legal\/en\/what-to-do-if-my-server-has-been-hacked\/","name":"What to do if my server has been hacked? - PLANIT\/\/LEGAL","isPartOf":{"@id":"https:\/\/legal-test.planit.legal\/#website"},"primaryImageOfPage":{"@id":"https:\/\/planit.legal\/en\/what-to-do-if-my-server-has-been-hacked\/#primaryimage"},"image":{"@id":"https:\/\/planit.legal\/en\/what-to-do-if-my-server-has-been-hacked\/#primaryimage"},"thumbnailUrl":"https:\/\/planit.legal\/wp-content\/uploads\/2025\/01\/Blogbeitrag_Was-tun-wenn-mein-Server-gehackt-wurde-1-e1736497835329.png","datePublished":"2025-01-13T09:33:21+00:00","dateModified":"2025-03-11T10:19:50+00:00","author":{"@id":"https:\/\/legal-test.planit.legal\/#\/schema\/person\/7eff3e9b2534f3f170ec260c1a1c1243"},"description":"It\u2019s time to dispel the myths surrounding hacking and forge a clear roadmap. Read more in our blog article.","breadcrumb":{"@id":"https:\/\/planit.legal\/en\/what-to-do-if-my-server-has-been-hacked\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/planit.legal\/en\/what-to-do-if-my-server-has-been-hacked\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/planit.legal\/en\/what-to-do-if-my-server-has-been-hacked\/#primaryimage","url":"https:\/\/planit.legal\/wp-content\/uploads\/2025\/01\/Blogbeitrag_Was-tun-wenn-mein-Server-gehackt-wurde-1-e1736497835329.png","contentUrl":"https:\/\/planit.legal\/wp-content\/uploads\/2025\/01\/Blogbeitrag_Was-tun-wenn-mein-Server-gehackt-wurde-1-e1736497835329.png","width":3555,"height":2053,"caption":"was tun, wenn mein Server gehackt wurde"},{"@type":"BreadcrumbList","@id":"https:\/\/planit.legal\/en\/what-to-do-if-my-server-has-been-hacked\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"","item":"https:\/\/planit.legal\/en\/"},{"@type":"ListItem","position":2,"name":"General Data Protection Regulation","item":"https:\/\/planit.legal\/en\/category\/general-data-protection-regulation\/"},{"@type":"ListItem","position":3,"name":"What to do if my server has been hacked?"}]},{"@type":"WebSite","@id":"https:\/\/legal-test.planit.legal\/#website","url":"https:\/\/legal-test.planit.legal\/","name":"PLANIT\/\/LEGAL","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/legal-test.planit.legal\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/legal-test.planit.legal\/#\/schema\/person\/7eff3e9b2534f3f170ec260c1a1c1243","name":"Lasse Kamin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/legal-test.planit.legal\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/928d4d87d5ae8c8d2549bf07f86f324b43d9b62b5dec3014a6e627b9993ea1fa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/928d4d87d5ae8c8d2549bf07f86f324b43d9b62b5dec3014a6e627b9993ea1fa?s=96&d=mm&r=g","caption":"Lasse Kamin"},"url":"https:\/\/planit.legal\/en\/author\/lkamin\/"}]}},"_links":{"self":[{"href":"https:\/\/planit.legal\/en\/wp-json\/wp\/v2\/posts\/10698","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/planit.legal\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/planit.legal\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/planit.legal\/en\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/planit.legal\/en\/wp-json\/wp\/v2\/comments?post=10698"}],"version-history":[{"count":9,"href":"https:\/\/planit.legal\/en\/wp-json\/wp\/v2\/posts\/10698\/revisions"}],"predecessor-version":[{"id":10788,"href":"https:\/\/planit.legal\/en\/wp-json\/wp\/v2\/posts\/10698\/revisions\/10788"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/planit.legal\/en\/wp-json\/wp\/v2\/media\/10691"}],"wp:attachment":[{"href":"https:\/\/planit.legal\/en\/wp-json\/wp\/v2\/media?parent=10698"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/planit.legal\/en\/wp-json\/wp\/v2\/categories?post=10698"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/planit.legal\/en\/wp-json\/wp\/v2\/tags?post=10698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}