Ransomware activities are escalating year after year, with more attacks noted all over the world. Seemingly no one is immune to such threats. Malware authors are continually developing new and sophisticated ransomware variants that can evade detection and employ new techniques to infect more systems.
In this chapter, I will discuss the different attack vectors employed by ransomware to invade computer systems, leaving the discussion of preventive measures until Chapter 4. Ransomware uses the same techniques used by other malware types to spread, so understanding ransomware distribution ...