Now that's a performance that needs an encore.
Hackers even used it to evaluate compromised financial documents, helping the attacker estimate a realistic ransom amount in Bitcoin and drafting threatening emails
He was linked to many cryptocurrency thefts.