Forks of Cyber Attacks