If your network is hacked, you will have a multitude of reactions, including an urge to respond in kind. Technically hacking the hackers isn’t legal, but deceiving intruders is! Advanced persistent threats are targeted at those who have information of value to the hacker. Scrubbing away malware is a simple process one can move on from, but if someone is infiltrating your files, reading your internal emails, etc. you cannot simply close the vulnerability and go about business as normal. Surely the threat actors will find another way back in if you don’t discover who they are. There are varying opinions about fighting hackers with their own tools. Using deception in a legal fashion, such as with the Modern Honey Network, is preferable.