Ransom Attacks in the Supply Chain Securing Your Downstream Data