The attacks aren't using cutting-edge methods, but rather exploiting fundamental security gaps