Tag evasive malware deployment strategies