© Nihad A. Hassan 2019
N. A. HassanRansomware Revealedhttps://doi.org/10.1007/978-1-4842-4255-1_2

2. Ransomware Distribution Methods

Nihad A. Hassan1 
(1)
New York, USA
 

Ransomware activities are escalating year after year, with more attacks noted all over the world. Seemingly no one is immune to such threats. Malware authors are continually developing new and sophisticated ransomware variants that can evade detection and employ new techniques to infect more systems.

In this chapter, I will discuss the different attack vectors employed by ransomware to invade computer systems, leaving the discussion of preventive measures until Chapter 4. Ransomware uses the same techniques used by other malware types to spread, so understanding ransomware distribution ...

Get Ransomware Revealed: A Beginner’s Guide to Protecting and Recovering from Ransomware Attacks now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.