Anatomy of a Cyberattack