Anatomy of a Cyber Attack