Understanding the Adversary: How Ransomware Attacks Happen
The most common access vectors for ransomware attacks continue to be phishing, vulnerability exploitation including Exploitation of a Public-Facing Application, and External Remote Services.