"This gives a graphic idea of ... the source code of the different families is very different," Panda concluded. However, said Panda, it's possible that the three hackers or groups of hackers ...