Saturday, May 31, 2025
HomeCyber Security NewsRansomware Gangs Encrypt Systems 17 Hours After Initial Infection

Ransomware Gangs Encrypt Systems 17 Hours After Initial Infection

Published on

SIEM as a Service

Follow Us on Google News

Ransomware gangs are accelerating their operations, with the average time-to-ransom (TTR), the period between initial system compromise and the deployment of encryption, now standing at just 17 hours, according to recent cybersecurity analyses.

This marks a significant shift from earlier tactics, where attackers often lurked in networks for days or weeks to maximize reconnaissance and control.

Some groups, such as Akira, Play, and Dharma/Crysis, have reduced their TTR to as little as 4-6 hours, showcasing their operational efficiency and adaptability.

- Advertisement - Google News

This rapid execution leaves organizations with a shrinking window to detect and respond to intrusions.

The trend highlights the increasing sophistication of ransomware groups, which leverage advanced tools and techniques to achieve their goals quickly.

Tactical Shifts: From Encryption to Data Exfiltration

While encryption remains a core strategy for many ransomware operators, there is a noticeable pivot toward data exfiltration and extortion.

Groups like BianLian have deprioritized encryption altogether, instead focusing on stealing sensitive data and threatening to release it unless a ransom is paid.

According to the researchers, this shift reflects an adaptation to improved enterprise defenses, such as endpoint detection and response (EDR) systems, which have made traditional encryption attacks more challenging.

The competitive ransomware ecosystem has also driven innovation. Malware families that fail to stay ahead of detection mechanisms risk obsolescence.

As a result, attackers are increasingly relying on stealthy tactics like “living off the land” techniques, abusing legitimate administrative tools, and leveraging scripting languages such as PowerShell and JavaScript for persistence and lateral movement.

Exploiting Vulnerabilities: A Race Against Time

Ransomware gangs often exploit vulnerabilities in remote monitoring and management (RMM) tools or use initial access brokers to infiltrate networks.

Once inside, they escalate privileges, exfiltrate data, disable security measures, and deploy ransomware payloads.

The reduced TTR underscores the importance of robust defenses at every stage of the attack chain.

Organizations must prioritize proactive threat detection and rapid incident response to mitigate risks.

Notably, attacks frequently occur during off-hours or holidays when organizational defenses are weaker.

In 76% of cases, encryption begins during weekends or after business hours, exploiting reduced staff availability for detection and response.

The evolving tactics of ransomware groups highlight critical gaps in organizational defenses.

While EDR systems have improved significantly, data loss prevention (DLP) technologies remain underdeveloped in many environments.

This imbalance leaves organizations vulnerable to data theft even if encryption is thwarted.

To counter these threats effectively:

  • Real-time monitoring: Deploy autonomous systems capable of detecting anomalies around the clock.
  • Layered defenses: Combine EDR with strong network segmentation and regular patch management.
  • User education: Train employees to recognize phishing attempts and other common attack vectors.

As ransomware gangs continue to refine their methods, the need for comprehensive cybersecurity strategies has never been more urgent.

Organizations must adapt quickly to this high-speed threat landscape or risk devastating consequences.

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges in Organizational Environments

A startling discovery by BeyondTrust researchers has unveiled a critical vulnerability in Microsoft Entra...

Threat Actors Exploit Google Apps Script to Host Phishing Sites

The Cofense Phishing Defense Center has uncovered a highly strategic phishing campaign that leverages...

Dadsec Hacker Group Uses Tycoon2FA Infrastructure to Steal Office365 Credentials

Cybersecurity researchers from Trustwave’s Threat Intelligence Team have uncovered a large-scale phishing campaign orchestrated...

Beware: Weaponized AI Tool Installers Infect Devices with Ransomware

Cisco Talos has uncovered a series of malicious threats masquerading as legitimate AI tool...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges in Organizational Environments

A startling discovery by BeyondTrust researchers has unveiled a critical vulnerability in Microsoft Entra...

Threat Actors Exploit Google Apps Script to Host Phishing Sites

The Cofense Phishing Defense Center has uncovered a highly strategic phishing campaign that leverages...

Dadsec Hacker Group Uses Tycoon2FA Infrastructure to Steal Office365 Credentials

Cybersecurity researchers from Trustwave’s Threat Intelligence Team have uncovered a large-scale phishing campaign orchestrated...