17.11 – Vectors

Every form of malware or exploit needs a vector, or path of infection, to become active. Even worms, which can cruise through a network and infect any systems they encounter, must be introduced somewhere. Understanding the vectors which malware uses is important when understanding risk and how to avoid contamination. The following pages will outline some of the most common vectors used by hackers:

  • Spam
  • Compromised links
  • Malware payloads
  • Poisoned USB keys
  • Key loggers
  • Social engineering
  • Internal attacks
  • Spoofing of sites or contact