Malvertising: Cybercriminals can buy ad space on legitimate websites and inject malicious code into the advertisements. When users click on these ads, they can unknowingly trigger malware downloads or be redirected to infected websites.

Removable media: Malware can be spread through infected USB drives, external hard drives, or other removable media. When these devices are connected to a computer, the malware can be automatically executed.

File-sharing networks: Malware can be disguised as popular files, such as software cracks, key generators, or pirated content, and distributed through peer-to-peer (P2P) file-sharing networks. Users who download and execute these files inadvertently install malware on their systems.

Social engineering: Cybercriminals often use social engineering techniques to manipulate users into taking actions that lead to malware infections. This can include tactics like enticing users to click on malicious links or download infected files through deceptive social media messages, fake software updates, or chat conversations.

Software vulnerabilities: Exploiting vulnerabilities in software is a common technique used by malware authors. By targeting security flaws in operating systems, web browsers, or other software applications, cybercriminals can deliver malware through drive-by downloads or malicious files.