The inherent nature of cyberspace has created an opportunity for adversaries to exploit vulnerabilities of victim state’s cyberinfrastructures anonymously for a myriad of reasons. States and nonstate actors can use multiple avenues and techniques to route malicious malware with relative ease