This post was originally published on this site

By understanding how cybercriminals use bitcoin, threat analysts can connect the dots between cyber extortion, wallet addresses, shared infrastructure, TTPs, and attribution.

This post first appeared on Dark Reading. click here for original article.

About The Author

Related Posts