These toolkits are often known as `crimeware'. They include a variety of propagation mechanisms and payload modules that even novices can deploy. Variants that can be generated by attackers using these toolkits creates a significant problem for those defending systems against them.