Step 2: Type in stolen password
Step 3: Click log in button
Step 4: ( •_• ) ( •_• )>⌐■-■ ( ⌐■_■)
Step 5: I'm in
One example of a "sophisticated" attack