If I were attacking Adobe I would do it differently; I would try to get into their update servers (in addition to however I got in first), to distribute malware back down onto their customers' systems as part of the legitimate update processes, and then after a few weeks or months of that threaten Adobe with an attack on however many (millions?) of customers they managed to infect, then later after being paid (and a brief respite) attack them anyway.
Remember the Solar Winds hack was about how updates are distributed. But it went after businesses, imagine the public outrage if Adobe became a vector to all their home and small business customers' being infected.
My Adobe Desktop reminded me today it auto updated itself. I do not every recall allowing that, it probably defaulted that way when I installed on my new computer. I just turned it off again. Not that in a manual update you can tell if the kit is infected, but at least then by staying a bit behind, you may hear if the world is ending because of updates before you manually update.
The only real solution to ransomware is to make cryptocurrency illegal. Untraceable means to pay ransom is why ransomware works. If you can follow the money, it stops working.
An interim solution is make it illegal for US companies to pay ransom, and if that doesn't pass constitutional muster, make it illegal for any government entity (especially local ones) to pay ransom. If ransom uniformly cannot be collected in a sector, most hackers will go elsewhere. Now that it just becomes a normal cost of business, with ransomware insurance.... there's motivation to the hackers, AND there's NO motivation (except insurance requirements) to the business to be on guard.