When a company is subject to a cyber attack, the first step is to understand what exactly came from and where, remove the malicious code and, preferably, find and close a vulnerable point in the infrastructure. And only then you can ask the question “who is to blame,” although, alas, quite often...