But tonight, Mara did something she hadn’t done in years. She walked to Chloe’s door, didn’t knock, and crawled into bed beside her little sister like they were kids again.

But he’d made one mistake. In the metadata of the screenshot, Mara’s tech-savvy roommate, Jorge, found an embedded GPS coordinate. Not hers. His. A coffee shop two miles away. The same coffee shop where Chloe had met Dylan twice “to talk.”

No software in the world could hack that.

Mara’s rational mind knew it was a scam. But the need won. She clicked.

“I’m telling Jorge.”

A long pause. Then the door cracked open.

Another message appeared: “Don’t bother changing your password. I’m already inside. Here’s what’s going to happen: Every week, you give me one more password. Not yours. Someone else’s. A friend. A coworker. Anyone with a digital life I can monetize. Refuse, and I send Chloe’s photos to her entire school—along with a little note saying her big sister leaked them while ‘helping.’ Choose wisely. You have 24 hours.” Mara looked back at Chloe’s open inbox. The bruises. The silence. The sunset bio. Her sister had been trying to disappear. And now, because Mara had tried to be a hero with a cheap piece of malware, she’d put a spotlight on both of them.

But that night, when Mara finally deleted Key Facebook Password Hacker v5.4 —dragging it to the trash, then wiping the drive with a bootable USB Jorge had prepped weeks ago “just in case”—she kept one thing.

“You’re going to delete everything,” Mara said quietly. “Every photo. Every backdoor. Every piece of access you have to me, to Chloe, to anyone.”

That’s when her own Facebook notification pinged. A friend request from David Mathers . She didn’t recognize the profile picture—a generic mountain vista—but the name tugged at something. She clicked.

They walked there the next morning. Mara didn’t bring a weapon. She brought a printed copy of every message from Chloe’s account, every timestamp, every threat. And she brought Chloe herself, who was terrified but tired of running.

“Did you actually install a reverse shell?”