In some cases, the indictment alleged, the hackers would wait months before identifying and harvesting sensitive data stored on the networks, presumably to prevent calling attention to the breaches. The series of intrusions spanned from February 2014 to January 2015.
Read full article on Technology Lab – Ars Technica