Answer:
1,3,4
Step-by-step explanation:
By cybercriminals to sell ransom services,by cybercriminals to purchase malicious software,for networking by criminal organizations
8.4m questions
11.1m answers