Did you mean "soft fork", or are you thinking of a different concept I'm not familiar with?
Forks can and have been used to deal with isolated malicious incidents, but do you think they can be successful against an actor in extended control of a substantial part of the hash rate?