Experts discovered personal information about the attacker by investigating IP addresses and device data connected to the attack.



Source link