The most typical supply program for ransomware is a phishing email that includes an attachment or a connection. For personal devices when the person opens the attachment or clicks the link, the ransomware operates a system that locks the process, and shows a desire for payment. When this happens, the one method to decrypt the info is thru a mathema