How you get infected with ransomware (and what to do about it)

Updated on October 20, 2022, by Xcitium

How you get infected with ransomware (and what to do about it)

How do you get infected with ransomware?

You can get infected with ransomware through phishing emails, malicious downloads, compromised websites, unpatched software, or weak remote access security. Most infections occur when users unknowingly open infected files or click malicious links.

The main ways you get infected with ransomware are email attachments, using the internet, and, to a lesser extent, through hardware (such as USB storage devices). Fortunately, there are steps you can take to protect against all of these. With that in mind, here is a quick guide on how you get infected with ransomware (and what to do about it).

Email attachments

Email may be one of the world’s most convenient ways of communication, but that convenience (and affordability) has also made it a tool for malicious actors. Automated email filtering has done a lot to reduce the spread of certain forms of malware. It’s now much more difficult just to throw out a load of malicious emails and hope that some of them hit a target. Automated filters are, however, unable to offer much, if any, protection against targeted social-engineering attacks.

This means that it’s long since stopped being enough to ask people to stop and think before they open email attachments. The hard truth of the matter is that even the best-informed people can be duped. Realistically, the only way to ensure protection against malicious email attachments is to have a policy that all email attachments must be scanned by a reputable anti-malware program before they are opened. This policy needs to be automated to ensure that it is applied every, single time without exception (no matter how busy or how senior the recipient).

Surfing the internet

In principle, there are all kinds of ways you can pick up ransomware when surfing the internet. In practice, the big two are social media platforms and malvertising.

Social media platforms have brought a lot of benefits, but they have also brought a lot of traps for the unwary. To be fair, the companies behind them are doing their best to address these. In fact, they need to address them to ensure the long-term survival of their service. In the mean-time, however, the onus is still very much on the user to protect themselves.

In the context of picking up ransomware through a social media platform, the main threat is short links. These are convenient. In fact, arguably they are essential on some platforms, such as Twitter, but they also conceal the nature of the link. In principle, it’s easy enough to check the genuine link. In practice, however, very few people are likely to bother, especially not when they’re scrolling through their social media feed on their lunch break.

Malvertising is a relatively new form of threat. It involves buying legitimate advertising space and then using the adverts for malicious purposes. The reason why malvertising is such a threat is that most website owners, even large ones, sell advertising space through agencies. These agencies tend to be all about volume and hence do not necessarily conduct rigorous checks on who is advertising with them or what the advert contains. This means that even reputable, “safe” websites can be compromised.

In principle, the easy way to deal with malvertising is to use an ad-blocker. This is exactly why so many reputable anti-malware products now include them (at least in their paid versions). The problem is that some websites only allow access to their site if the user permits adverts. This means that you need a Plan B and the obvious solution is to use a reputable anti-malware product with an integrated firewall.

Hardware

It’s currently relatively uncommon for malware to be spread through hardware since it takes more effort (and hence more risk and cost) than spreading it digitally. Ransomware, however, can be very lucrative, which can make it worth the effort. Always remember that robust digital security rests on a foundation of robust physical security. What this means in practice will depend on the device.

For example, with desktop computers, it generally means securing the room in which they are held and securing access to any ports, especially USB ports. For mobile devices, it includes thinking about how they will be charged and trying to eliminate them being plugged into external USB ports such as the ones in public charging stations.

Keeping your system safe from ransomware

It is extremely risky to rely on the default security apps bundled with the main operating system. These are better than nothing, but the companies behind them are not dedicated cybersecurity companies and cannot be expected to have the same level of expertise as sector specialists. You need a proper anti-malware program with an integrated firewall from an actual security company.

You also need to ensure that you are rigorous about ensuring that your operating systems and locally-installed applications are promptly updated.

Top Ways You Can Get Infected with Ransomware

  1. Phishing emails and attachments
    Attackers send fake emails with malicious files or links.
  2. Malicious downloads
    Downloading cracked software or fake updates can install ransomware.
  3. Compromised websites (drive-by downloads)
    Visiting infected sites can automatically download malware.
  4. Unpatched software vulnerabilities
    Outdated systems are easy targets for attackers.
  5. Remote Desktop Protocol (RDP) attacks
    Weak passwords allow hackers to access systems remotely.
  6. USB drives and external devices
    Infected storage devices can spread ransomware.
  7. Malvertising (malicious ads)
    Clicking fake ads can trigger downloads.

Common Ransomware Infection Methods

Infection MethodRisk LevelHow It Happens
Phishing emails⭐⭐⭐⭐⭐Fake attachments or links
Software downloads⭐⭐⭐⭐Pirated or infected apps
Unpatched systems⭐⭐⭐⭐⭐Exploited vulnerabilities
RDP attacks⭐⭐⭐⭐Weak credentials
Malicious websites⭐⭐⭐Drive-by downloads
External devices⭐⭐⭐Infected USB drives

Real Examples of Ransomware Infections

  • Fake invoice email with infected attachment
  • “Delivery failed” message with malicious link
  • Fake software update pop-ups
  • Cracked software downloads from unsafe websites

👉 These scenarios are commonly used in real attacks.

How to Avoid Getting Infected with Ransomware

Infection MethodPrevention Tip
Phishing emailsAvoid suspicious attachments
Malicious downloadsDownload only from trusted sources
Unpatched softwareEnable automatic updates
RDP attacksUse strong passwords + MFA
Malicious websitesUse web filtering tools

How Businesses Get Infected with Ransomware

  • Weak remote access security (RDP exposure)
  • Lack of endpoint protection
  • Unpatched enterprise systems
  • Poor employee awareness
  • Lack of Zero Trust security

👉 This is where Xcitium’s Zero Trust and containment approach becomes a strong differentiator.

FAQ

What is the most common way to get ransomware?

Phishing emails are the most common method, often disguised as legitimate messages.

Can you get ransomware just by visiting a website?

Yes, compromised websites can install ransomware through drive-by downloads.

How fast can ransomware infect a system?

Some ransomware can encrypt files within minutes of infection.

Can ransomware spread across networks?

Yes, advanced ransomware can move laterally across networks if not contained.

Please‌ ‌click‌ ‌‌here‌‌ ‌now‌ ‌to‌ ‌start‌ ‌your‌ ‌free‌ ‌30-day‌ ‌trial‌ ‌of‌ ‌Xcitium AEP.‌

GET FREE TRIAL

Ransomware Attacks
Ransomware Protection
Ransomware Removal
Ransomware Virus
IT Service Management
Does Ransomware Steal Data

Please give us a star rating based on your experience.

1 Star2 Stars3 Stars4 Stars5 Stars (1 votes, average: 5.00 out of 5)
Loading...
Expand Your Knowledge