The Hidden World of Sock Puppets in Cybersecurity