Anatomy of a Centralized Exchanges Attack