Ransomware Deployment Strategies