Social Engineering Anatomy of a Hack