Learning from a Real-Life Cyberattack Investigation