Here are links to an ongoing debate about the legality and morality of hacking back. That is, if your computer is compromised then you go to hack the attacker by following their trail/exploiting their virus, etc. etc.
First link is a compilation of all the arguements between the three main parties as they are all over the place, essentially your roadmap through several years worth of back and forth. And the second is the site where the posts are originally at.
http://www.steptoecyberblog.com/files/2012/11/PEST-CONTROL1.pdfhttp://www.volokh.com/