Coordinated Reply Attacks in Influence Operations: Characterization and Detection