QUESTION: HOW DO WE MAKE OUT TARGET GET INFECTED BY THE MALWARE WE WANT THEM TO HAVE?
ANSWER:
Inject executable, malicious code into PDF, JPEG, MP3, etc
There must be some security hole in the application.
Think like any very-simple-and-common .txt file: if you open it with a hex viewer, or...