Cyber threats and threat actors

Imagine that the organization you work at has been involved in a cyber-attack. Using what you’ve learned about cyber threats and threat actors, respond to the following in your discussion post as you reflect on this scenario:

Many of the stakeholders and managers are asking you if it’s acceptable to return hack and try and be retaliatory or proactive to preempt another strike. Do you think this a good idea for an organization?
What are the dangers and possible legal ramifications of attempting this sort of activity?