By understanding how cybercriminals use bitcoin, threat analysts can connect the dots between cyber extortion, wallet addresses, shared infrastructure, TTPs, and attribution.
Dark Reading:

Leave a Reply

Your email address will not be published. Required fields are marked *