What to do when disaster strikes: Recovering from malicious attacks