What is the first step a blockchain security responder should take when a smart contract exploit is detected on a live network?