Once an attacker with ransomware on their mind gains control of a networked endpoint, they will use that compromised endpoint as a means to encrypt data on other devices on the same network. This is what remote ransomware attacks are all about.
Source: SC Magazine