A peek under the hood of a cybercrime operation and what you can do to avoid being an easy target for similar ploys