Hacking your hacker has been a law for 25 years or more.
An IT manager for a local hospital helped me go after an advertising company that was using my PC to send spam advertising.
We figured out who they were (in Louisiana), sent the operator 2 warnings to cease. When they continued, we broke into their system, determined the model and serial number of their motherboard then went to the Dell site and downloaded the BIOS update.
We then used a binary editor to locate the instruction that erases the BIOS EEPROM just before writing a new one and filled the rest of the program with NOOP instructions.
We then placed the file on their machine and renamed it to one of the files that gets executed during a boot up.
Two days later, the hacking of my system stopped.
I’d loved to have seen their reaction when the machine would no longer boot.
Ian is that you?
As I recall, the legal term for hacking a hacker that has attacked your system is “vigilante hacking”.