The true identities and motives of the attackers remain unclear. Researchers suggest that multiple threat actor groups may be involved, potentially sharing resources, as there is some overlap in activity clusters. The motivations driving these attacks are yet to be determined.
