Closing intrusion vectors force cybercriminals to revisit old attack avenues, but also to look for new ways to attack their victims