Earlier this morning I watched William Gibson tweeting about attribution decay:
To which I replied that:
The cyber warfare literature is full of writings on the demand for proper attribution and the problems it poses when action (kinetic or not) is needed. However I have not yet seen a proper term describing the (instinctive) strategy employed by attackers who want to leave no proper attribution trace behind (usually hopping from system to system). “Attribution decay” seems to fit perfectly.