Cybercriminals use this clever strategy to trick you into compromising your tech so they don’t have to do the dirty work.