We have a cinematic view of cybercrime. We imagine a hooded figure in a dark room, typing furiously against a green terminal, crafting a complex zero-day exploit to bypass a firewall’s encryption ...