Many of the breached systems were not properly equipped with tools that recorded network activity, making it harder to quickly trace the origins of the hack, a person familiar said.
Support the originator by clicking the read the rest link below.