Hackers infiltrate 50 common methods