Anatomy of a botnet attack