The simplicity and profitability of these attacks continue to appeal to threat actors a decade later.