threat intelligence The practical value of cyberthreat attribution Why is it useful to attribute malware to a specific hacker group?