Paths to Destruction: 3 Ways Malware Infects IoT Systems