The attack's success relies not on sophisticated malware or zero-day exploits but on human psychology and social engineering.