The Anatomy of a Cyber Threat