The Anatomy of Highly Profitable Credential Stuffing Attacks