A Myth or Reality? Debunking (Mis)Conceptions Surrounding Cloud Ransomware