Security experts warn it may be too soon to tell whether follow-on activity has occurred.