Anatomy of a ransomware attack