Attribution of cyber-intrusions and attacks is nearly impossible. A
well executed attack can not be traced back to its culprit. If there are
some trails that seem attributable one should be very cautions following them. They are likely faked.
Hundreds if not thousands of reports show that this lesson has not been
learned. Any attack is attributed to one of a handful of declared
“enemies” without any evidence that would prove their actual