Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

URL has been copied successfully!
Attack time frames are shrinking rapidly. Here’s how cyber teams can cope
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

Attack time frames are shrinking rapidly. Here’s how cyber teams can cope

Time frame changes to time to exploit: The time frames are quickly shortening as the focus by a variety of attackers’ ransomware efforts shift to data stealing first, rather than trying to collect ransoms.A recent Huntress Cyber Report shows that that TTE, which the researchers refer to as “time-to-ransom” or TTR, has dropped to a few hours for some ransomware groups. Times for many attacker groups are less than 44 hours, with some groups exploiting their code within four hours; overall, the average TTE is around 17 hours across all ransomware activities studied. The researchers attribute the different times to different methods: “some groups prefer smash-and-grab techniques versus others who prefer slow-and-low methodologies.” The latter form was also recognized by Radware in its 2025 threat report, which found a 38% increase in this method of operation over the past year for DDoS attacks. These attacks “involve sending a small stream of very slow traffic, making them difficult to detect and mitigate,” Radware’s researchers wrote.Palo Alto Networks’ most recent Unit42 incident report also sees the threat time frame shrinking, having found that a quarter of data thefts happen in less than five hours from when a piece of malware first enters a network. This rate is three times faster than what the company’s researchers saw in 2021. They predict that attackers use of various AI tools will make things worse by cutting down these times even further, even to minutes. One problem is that because many enterprises use a variety of detection tools, there is a lack of information sharing, resulting in siloed reporting, which makes it more difficult to catch malware quickly.

Time frame changes to dwell time: Dwell times are also dropping. According to a Secureworks report from last year, some ransomware group’s dwell times shrunk to as short as seven hours, and a tenth of all intrusions studied happen within five hours of gaining initial access. Moreover, CrowdStrike says that breakout time, how long it takes for an adversary to start moving laterally across your network, reached an all-time low in the past year, down to an average of 48 minutes, with the fastest breakout time they observed being 51 seconds. This means cyber teams need better real-time threat detection and more solid identity and access controls to identify and halt intrusions before they spread. CrowdStrike researchers noted one malware group, dubbed Curly Spider, takes less than 4 minutes from initial phishing interaction to establishing a persistent network backdoor. “The malware compromises the network in seconds by securing long-term access before the victim even realizes what’s happening,” they wrote.Barracuda’s Burgess reasons that attackers now have a more rushed agenda and grab data as quickly as they can. This also means defenders must be able to quickly react once malware is detected, which again reinforces the notion of breaking down security silos and having more cross-team cooperation and cross-tool integration to be able to respond and eliminate a potential threat.

What cybersecurity teams can do: Veracode recommended in its State of Software Security 2025 report that defenders try to gather all risks in one place and focus on what matters most to an organization. “You need a way to see what’s exploitable, reachable, and urgent to help you prioritize further,” its researchers remarked.That is easy to say but a lot harder to implement. Other analysts have seen complicating factors making any cross-team cooperation difficult. Tamnoon, a cloud security vendor, has found that CNAPP tools classify the severity of threats differently and often are at odds with one another, citing one example in which one tool called a potential issue “informational” while another tool flagged the same issue a critical threat. “We saw organizations attempting to manage hundreds and thousands of critical alerts simultaneously. With such volume, prioritizing what to do next becomes challenging, causing many critical alerts to remain in the backlog for months at a time,” its report authors wrote.Also contributing to these longer resolution times is that software is getting more complex, and analysts are having a harder time to scan their code, and find and fix flaws. Veracode’s report shows time-to-fix software flaws has increased 47% since 2020 and the proportion of apps with high severity flaws has almost tripled in that time. “Finding flaws is easy these days; fixing them is where the challenge lies,” the authors wrote. One solution, not surprisingly coming from a vendor that sells code scanning tools, is to perform more frequent application testing and scanning, along with better and more thorough security training. Another is to seek out and eliminate overall security debt, so that developers are continuously improving their code and finding these flaws.Overall, defenders have to up their game, and act quickly. Time is of the essence.

First seen on csoonline.com

Jump to article: www.csoonline.com/article/3841865/what-cybersecurity-teams-need-to-know-about-shrinking-attack-timeframes.html

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link