Text this: Malicious Attack Propagation and Source Identification