How these attacks typically unfold: