The Anatomy of a Cyberattack: Inside an Incident