Cutting the gordian knot: A look under the hood of ransomware attacks