When you are hacked, figuring out who is seeking help can be a puzzle

Compsmag