Malware Deployment Strategies