The document summarizes the anatomy of a SamSam ransomware attack based on investigations into this threat. It finds that SamSam attacks follow six stages: 1) Target identification and acquisition, often exploiting vulnerabilities in JBOSS systems or brute forcing RDP passwords, 2) Penetrating the network using these weak credentials, 3) Elevating privileges on the network to domain admin, 4) Scanning the network for target computers using scanning tools, 5) Deploying and executing the ransomware using tools like PsExec, and 6) Awaiting payment from victims via dark web payment sites provided in ransom notes. The document also traces the evolutionary timeline of SamSam payloads and attacks from early 2015 tests to increasingly sophisticated versions in 2017