185.25.51.173-20220227.json Official
: Reference the ITECH2303 Data Analytics assignment for real-world examples of how these logs are used in curriculum. When the hackers get hacked - Northwave Cyber Security
: Use natural language processing (NLP) to categorize the leaked JSON data. Key Questions :
Can sentiment analysis detect the internal tension within the group during the February 2022 invasion? 185.25.51.173-20220227.json
: Explore how the Russia-Ukraine war led to the dissolution of one of the world's most profitable ransomware groups. Key Questions :
: Identify operational security (OPSEC) failures and organizational structures revealed in the files. Key Questions : : Reference the ITECH2303 Data Analytics assignment for
: The Impact of Geopolitical Conflicts on Cybercrime Organizations: A Case Study of ContiLeaks
What are the power structures between "bosses" and "operators" in the chats? : Explore how the Russia-Ukraine war led to
What visualization techniques (e.g., social network graphs) best represent member interactions?