String of escalating exploits: Sure, but both the initial stuff and the thing doing the encryption should be stopped by A/V (as long as the signature is known), right?
Unknown signature: That can only happen once, yes? So if, say, a government attacks another government, sure. But the FBI seem to have a pretty good handle on this ransomware vendor; surely they know the signatures used (and have reported them so that they are now in everyone’s antivirus)?
Phishing victims could be anyone: Oh, I know. I’ve seen some pretty good phishing attempts, and I think I am sort of hyper-vigilant. Plenty of people who would never be aware. But, even if you click a link on a website, that downloads a virus, right? It’s that virus that should be flagged (again, assuming that the signatures are known).
Whack-a-mole: Sure. But we’ve got a small number of ransomware builders against all of the security firms, NSA, FBI, and CyberCom, at least. That is a lot of security horsepower; how come they can’t stay on top?
Some of these ransomware attacks began with a password hack, so there may not have been a click on a website. But even the hacked user must install software in order to penetrate a system, yes? I mean, it’s not like all this could happen with RDP through a firewall… could it? That would be a chilling scenario if it were possible.
Disabled antivirus: That is obviously a problem, so how come it is as easy as an admin clicking a button? Maybe that is OK for a home user, but one would think that an installation with thousands of users/servers would require more than that. There should be logs and warnings, at least. No?
EDIT: Also, in order for ransomware to spoil backups, doesn’t that require malicious software to exist on the system for at least days or weeks? Again, how come antivirus scans (and the backup software itself) doesn’t flag that?