Ransomware: Threat Analysis and Countermeasures