For each case answer the following questions
Question 1: What reason for this successful attack? What was the vulnerability (Flaw or weakness that allows a threat agent to bypass security)?
Question 2: Attack surfaces type?
Question 3: Who are the threat actors?
Question 4: What can be done to defend against this particular attack (So, it will not happen again)?