The worm that turned: A new approach to hacker hunting