The document discusses the evolution of malware from Malware 1.0 created by bored kids to Malware 2.0 created by organized criminal groups for monetary gain. It outlines how groups discover and sell exploits, develop and sell malware, host exploits/malware, sell stolen data, and use the stolen data. It also discusses how infection vectors have changed from file replication to exploits and social engineering. Modern malware distribution techniques like iframes, malvertisements, and social media/website redirection are highlighted.