Even state level forensics offers a very shallow yield. From such conspicuous behaviour.
Trying to compromise any/all of users' silos creates a distinct footprint - back to perpetrators. For a single arbitrary file?
The effort necessary to compromise a single user's file is disproportionate to the exposure, ummn, exposed.