The most typical shipping and delivery method for ransomware can be a phishing e-mail that includes an attachment or even a url. For particular person devices once the user opens the attachment or clicks the hyperlink, the ransomware operates a program that locks the system, and shows a need for payment. When this occurs, the only strategy to decry