Understanding Backdoor Attacks through the Adaptability Hypothesis