Assuming that your system is secured as well as can be, and that your question is not about how to fend off attacks but rather how to stop your attackers from being able to continue, isn't this the kind of thing that the police or other law enforcement agencies would normally investigate?
Sam