Stages of a Ransomware Attack