Ransomware - Anatomy of an Attack