Cyber criminals increasingly use advanced methods to implement attack vectors