Fig. 5From: Under false flag: using technical artifacts for cyber attack attributionTypes of artifacts gathered from other sources (than technical infrastructures) that aid the attribution processBack to article page