Where does your Malware Come From? [Infographic]

It’s pretty obvious that computer savvy criminals are the sole owners and proprietors of malware’s rampage through the annals of the Internet. It’s also fairly clear, through simple logic, their reasons for doing so – they’re either looking for illicit personal gain or the creation of chaos.

The question, though, is how they pull it off. How exactly is malware proliferated?

How do cyber criminals ply their craft and infect as many systems as possible? There isn’t one simple means of delivery after all. Multiple avenues of infection exist and any of them could feasibly bring a system down.

Today’s infographic is titled “Malware Networks: The Big 5 Points of Entry,”  and examines the means by which malicious software can enter the system of a user.

“A malware delivery network,” it reads, “gathers unsuspecting users, usually when they are visiting trusted sites, and routes them to malware, via relay, exploit, and payload servers that continually shift to new domains and locations.” The infographic then details the five largest malware networks in the world, then details the most common means by which a system might become infected – and five things businesses and users should concern themselves with where malware enters the equation.

Infographic is below – click to enlarge.

What do you think? Are you routinely doing any of these things which allow malware into your system?


  1. I think it sucks, as it won’t expand in Chrome or Firefox.

    • David Ecklein says:

      We must beef up the Computer Fraud and Abuse Act (CFAA). Too many hackers, viruses, and trojans on the internet compromising privacy and plundering bank accounts. Many are beginning to avoid the internet. Switching from Windows to a less popular operating system (MAC or Linux)is a temporary solution, as many MAC users have found. As Linux attracts more users, it may be targeted soon.

      It is becoming more difficult to remove viruses, trojans, and worms. Often one must reload the computer – clients lose applications, email, and other data.

      Much computer crime is breaking and entering; a violation of privacy. It can include theft of information or financial assets. Aside from anxiety, it also wastes millions of man-hours every month. Computers are part of our lives. And those who make life miserable should be called to account and suffer consequences.

      Much computer crime originates in locales outside US law. Therefore we should pursue it in international forums like the UN and Interpol. Instead of cruising around the world trying to foment new wars like his predecessor, Mr. Kerry would do well to put internet security and safety on his travel agenda.

  2. control++ will enlarge the page in Mozilla.

  3. The graphic does not expand and zooming in doesn’t help because the small text is unreadable.

Speak Your Mind