You must log in or register to comment.
Trisolarans.
I have found the one and only answer I will allow.
I happen to be in the middle of book #2 right now, ha ha.
It could be a lot of things ranging from state threat actors looking for a toehold into a network or to cost the government time and resources or people doing it for the lulz.