Here’s a look at how an MCC hack unfolds, what attackers change once inside, and how teams can recover access and clean up ...