Why criminals are using this old technique to take cyberattacks back to the future