Experts discovered personal information about the attacker by investigating IP addresses and device data connected to the attack.
Headline
Experts discovered personal information about the attacker by investigating IP addresses and device data connected to the attack.