Many varieties of ransomware begin doing damage as soon as they gain a foothold on the target network. They gain access often by Phishing techniques, credential stealing, or brute force attacks on internet-facing devices, and skillfully bypass or disable weak to moderate cybersecurity systems during installation.