The allure of cybercrime is the anonymity it affords behind layers of technological protection: an alias, a TOR (The Onion Router) network, a virtual private network (VPN), a pseudonymous Bitcoin wallet. For an organization under siege, the inability to unveil a hacker’s identity is all the more excruciating.
DISCLAIMER: This case study depicts a fictional cyber incident based on real-life scenarios described by expert interviewees, media reports, and other publicly available resources. While the details surrounding the characters, company, and ransomware attack are imagined, the business concerns and legal issues raised are plausible and based on actual cases.

