A loophole in the protocol’s user interface is being doubted as the entry point for the attackers. Internal as well as external investigations in the case are going on.