We were able to analyze data from a perspective we typically don’t get to see… a threat actor’s host!