Fig. 5
From: Under false flag: using technical artifacts for cyber attack attribution

Types of artifacts gathered from other sources (than technical infrastructures) that aid the attribution process
From: Under false flag: using technical artifacts for cyber attack attribution
Types of artifacts gathered from other sources (than technical infrastructures) that aid the attribution process