Understanding Propagation of Malicious Information Online