Human-enabled entry points
Ransomware attacks overwhelmingly target identity. Attackers use the same psychological levers that advertisers and con artists have relied on for ages—urgency, trust, routine, and intimidation—to override people’s better judgment.
Phishing and smishing
The time it takes from a user receiving a phishing email to giving an attacker a foothold averages less than a minute. That efficiency is why 42% of organizations face weekly or daily phishing attempts. Today’s spearphishing attacks are highly sophisticated, using LinkedIn or corporate directories to source personal and organizational details about targets. Attackers can then use genAI to craft convincing phishing emails, often posing as an executive, vendor, or IT help. They might ask for a password reset or include a fake invoice that launches a malicious PowerShell when opened.
Beyond business email compromise (BEC), bad actors use vishing (voice phishing), angler phishing (using fake social media accounts), and adversary-in-the-middle (AiTM) attacks. Smishing (SMS-based phishing) is growing exponentially due to users’ higher trust in text messages and on-the-go mobile habits. A common scenario involves sending “package delivery failure” notifications, where users click on a shortened URL. Since mobile devices often lack robust endpoint protection, this leads to credential theft and malware delivery.
MFA fatigue
MFA fatigue is so insidious because it weaponizes a central aspect of modern security: multi-factor authentication. After stealing credentials through phishing, credential stuffing, or dark web purchase, attackers use this follow-up tactic (also called “push bombing”) to bypass MFA controls.
The intruder repeatedly tries to log in with the legit credentials, bombarding the real user with MFA push notifications. Users often hit “Approve” out of frustration, accidental touch, or the belief that the system is malfunctioning. Attackers may even call the user, posing as the IT help desk, and instruct them to "approve the request to resolve a sync error." This strategy has led to high-profile breaches at even tech-forward companies like Uber and Cisco.
Excessive privileges
While phishing and MFA fatigue open the door for hackers, excessive privileges give them the means to spread ransomware. In many environments, standard users have permissions that allow them to view or modify sensitive directories that are irrelevant to their daily tasks. If an office administrator has “local admin” rights on their workstation and they click a malicious link, ransomware can disable antivirus software, modify system registries, and harvest credentials from the machine's memory. If that same account has access to network drives or server backups, the ransomware can encrypt the entire company's data in minutes.