FBI is enthusiastic about any information and facts that may be shared, to include boundary logs demonstrating communication to and from overseas IP addresses, a sample ransom Take note, communications with threat actors, Bitcoin wallet details, decryptor documents, and/or simply a benign sample of the encrypted file.[13] Stanford professor David D