Ejemplares similares: Ransomware Attacks and Defense Against Them