http://news.trust.org/item/20170531130252-ffi24 TALLINN, Estonia, May 31 (Reuters) - Veteran espionage researcher Jon DiMaggio was hot on the trail three months ago of what on the face of it looked like a menacing new industrial espionage attack by Russian cyber spies. All the hallmarks were there: targeted phishing emails common to government espionage, an advanced Trojan horse for stealing data from inside organisations, covert communication channels for grabbing documents and clues in the programming code indicating its authors were Russian speakers. It took weeks before the lead cyber spying investigator at Symantec, a top U.S. computer security firm, figured out instead he was tracking a lone-wolf cyber criminal. DiMaggio won't identify the name of the culprit, whom he has nicknamed Igor, saying the case is a run-of-the-mill example of increasing difficulties in separating national spy agency activity from cyber crime. The hacker comes from Transdniestria, a disputed, Russian-speaking region of Moldova, he said. "The malware in question, Trojan.Bachosens, was so advanced that Symantec analysts initially thought they were looking at the work of nation-state actors," DiMaggio told Reuters in a phone interview on Wednesday. "Further investigation revealed a 2017 equivalent of the hobbyist hackers of the 1990s." Reuters could not contact the alleged hacker. The example highlights the dangers of jumping to conclusions in the murky world of cyber attack and defence, as tools once only available to government intelligence services find their way into the computer criminal underground. Security experts refer to this as "the attribution problem", using technical evidence to assign blame for cyber attacks in order to take appropriate legal and political responses. These questions echo through the debate over whether Russia used cyber attacks to influence last year's U.S. presidential elections and whether Moscow may be attempting to disrupt national elections taking place in coming months across Europe. The topic is a big talking point for military officials and private security researchers at the International Conference on Cyber Conflict in Tallin this week. It has been held each year since Estonia was swamped in 2007 by cyber attacks that took down government, financial and media websites amid a dispute with Russia. Attribution for those attacks remains disputed. THE SMOKING GUN "Attribution is almost never a clean, smoking-gun," said Paul Vixie, creator of the first commercial anti-spam service, whose latest firm, Farsight Security, helps firms track down cyber attackers to identify and block them.