The Predator's Logic: How Hackers Actually Choose Which Companies to Attack