In my case too the attackers knew what they were doing and sent the money to other wallets like Bitrefill or WoS and from there they quickly vanished with the money, I'd say it's impossible to track even if everybody cooperates.
I feel like I should mention here that attackers most of the times know exactly who they should target. They are not going to waste their time with a target that may be too hard if there are tons of other targets that are easier to exploit.
For example, many people ask other people who got scammed:
How could you get scammed by someone like this? Wasn't it obvious?
It's selection bias: Most people who got scammed will think in hindsight: Why didn't I see all the red flags?
For example, scammers are using errors in their scam emails on purpose.
These errors are there to filter out exactly the people that are too smart anyway to get scammed. So only the "less smart" people actually contact the scammer so the scammer doesn't waste his time with people who are just going to waste his time.
Knowing stuff like this is the reason why I am very hesitant to connect https://delphi.market to mainnet since I might have to say one day: I wasn't smart enough myself to not get my funds drained, lol
Or I will at least put only very little funds first to see if there are some script kiddies who can already exploit my code - since I don't really know how secure my code is until it's live and ready to get exploited by real attackers.
But then again, can't be sure if I put more funds into it, if I am now going to attract new, more sophisticated attackers ...
we really need more security around LND nodes, lol