We must assemble a team of hackers, and use a reverse IP trace to determine their location. With that knowledge, we can coordinate a covert mission to infiltrate their organization and upload a virus to disable outbound communication of any kind, preventing them from spreading their influence any further.