Perpetrators have several methods at their disposal to infect a victim with ransomware. 