This document discusses active attacks on anonymized social networks. It describes how an attacker can construct a secret subgraph and attach it to targeted nodes before the network is anonymized. After anonymization, the attacker can use graph isomorphism techniques to recover the secret subgraph and de-anonymize the targeted nodes. Two specific active attacks are presented: a walk-based attack that uses short random walks and a cut-based attack that leverages minimum cut properties. Countermeasures like detecting fake accounts and graph perturbations are proposed to strengthen anonymity.