1. Deliver Malicious App via Authorised App Store. 2. Deliver Malicious App via Other Means. 3. Drive-by Compromise. 4. Exploit via Charging Station or System. 5. Exploit via Radio Interfaces. 6. Install Insecure or Malicious Configuration. 7. Lockscreen Evasion. 8. Masquerade as Legitimate Apps. 9. Supply Chain Compromise.