In just a few hours, hackers can use a cloud platform to load attack scripts and launch their assaults