"The hacker then attempts to get information, such as card numbers, 800 numbers, or test loops." . . . .