Identifying victims to be compromised