This involved placing SQL injection strings on victims' networks and programming the code to identify, store and export information on computers that were hacked, including information such as credit and debit card numbers and corresponding personal identification information of cardholders.