(Source: Marlin Finance Media Room) Security firm Proofpoint found attackers typically use email to plant ransomware. … software and networks until a payment is made to gain the decryption key.