To protect the integrity of our methods and processes, we often won’t be able to explain how we attribute certain attacks to suspected attackers.

Source : Notifications for targeted attacks