Attackers continue to enhance their performance, apply smart business techniques