Experts discovered personal information about the attacker by investigating IP addresses and device data connected to the attack.

Leave a Reply

Your email address will not be published. Required fields are marked *