Source: Steven Adair and Ned Moran, Shadow Server

In the last year, attackers engaged in cyber espionage have increasingly turned to the web to distribute their malware via drive-by exploits.