Hackers May Share Break-In Methods, Say Some Analysts