Outside of that, there's tons of data online already regarding Russian government hacking activity: http://researchcenter.paloaltonetworks.com/2016/06/unit42-ne... https://www.fireeye.com/content/dam/fireeye-www/global/en/cu... https://securelist.com/blog/research/72924/sofacy-apt-hits-h... http://researchcenter.paloaltonetworks.com/2016/09/unit42-so...
Do you think understanding the tools, infrastructure, coding styles, activities, targets of these groups allows them to perform attribution?