Hunting for Hackers with Sigma Rules