How to Shut Down a Phishing Attack at the Beginning of the Cyber Kill Chain