You compile a full report—IP logs, timestamps, DNS leaks. You send it to Europol and INTERPOL cybercrime units.
They respond. They’re aware of the group. They need more.
"Can you hold the connection steady for a trace?"