Experts discovered personal information about the attacker by investigating IP addresses and device data connected to the attack.
Experts discovered personal information about the attacker by investigating IP addresses and device data connected to the attack.