As highlighted by new ESET research this week, attributing a cyberattack to a specific threat actor is a complex affair