It’s pretty obvious that computer savvy criminals are the sole owners and proprietors of malware’s rampage through the annals of the Internet. It’s also fairly clear, through simple logic, their reasons for doing so – they’re either looking for illicit personal gain or the creation of chaos.
The question, though, is how they pull it off. How exactly is malware proliferated?
How do cyber criminals ply their craft and infect as many systems as possible? There isn’t one simple means of delivery after all. Multiple avenues of infection exist and any of them could feasibly bring a system down.
Today’s infographic is titled “Malware Networks: The Big 5 Points of Entry,” and examines the means by which malicious software can enter the system of a user.
“A malware delivery network,” it reads, “gathers unsuspecting users, usually when they are visiting trusted sites, and routes them to malware, via relay, exploit, and payload servers that continually shift to new domains and locations.” The infographic then details the five largest malware networks in the world, then details the most common means by which a system might become infected – and five things businesses and users should concern themselves with where malware enters the equation.
Infographic is below – click to enlarge.
What do you think? Are you routinely doing any of these things which allow malware into your system?
The PCMech.com weekly newsletter has been running strong for over 8 years. Sign up to get tech news, updates and exclusive content - right in your inbox. Also get (several) free gifts.