AI is helping hackers get access to systems quicker than ever before

ransomware avast
(Image credit: Avast)

  • Hackers are carrying out attacks faster than ever, report claims
  • ReliaQuest research says encryption of exfiltrated data is becoming less likely
  • Phishing remains the top attack vector

As well as boosting businesses across the world, the adoption of AI by security teams and hackers has also changed the cybercrime landscape, with new research from ReliaQuest claiming cybercriminals are now faster than ever at breaching systems, with the average time between initial access and lateral movement now just 48 minutes.

Interestingly, the report found hackers are relying less and less on encryptions, with 80% of all breaches involving data exfiltration, but just 20% including encryption, and many attackers are, abandoning encryption altogether, focusing solely on data theft, "a faster, more profitable approach,” the report confirms.

This suggests companies are perhaps less inclined to pay ransoms, and hackers are finding more success in simply selling the stolen data, rather than making demands.

Old habits die hard

This isn’t perhaps entirely surprising, as fewer than half of ransomware incidents result in payment, and of those who pay the ransom, only around 7% actually ever fully recover their information - so there’s not much incentive on either side.

The research also shows phishing is once again the top initial access technique, and 30% of these attacks include credential harvesting. Social engineering attacks are evolving too, with ‘voice phishing’ now behind 14% of breaches - especially targeting the manufacturing sector, likely due to the ‘frequent IT interactions and lenient help-desk policies’ needed to handle the high volumes of support requests.

But the findings also mean security teams are going to have to rethink their priorities in the coming months, and in 2025, companies will have to bolster their defenses to avoid any costly downtime.

“The focus can no longer be solely on restoring encrypted systems—strategies must also address protecting data privacy, managing reputational risks, and ensuring compliance with regulatory requirements,” the report adds.

“To prepare, CISOs must implement defenses to detect and prevent exfiltration attempts while developing playbooks that prioritize business continuity and resilience against these evolving ransomware tactics.”

You might also like

Ellen Jennings-Trace
Staff Writer

Ellen has been writing for almost four years, with a focus on post-COVID policy whilst studying for BA Politics and International Relations at the University of Cardiff, followed by an MA in Political Communication. Before joining TechRadar Pro as a Junior Writer, she worked for Future Publishing’s MVC content team, working with merchants and retailers to upload content.

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.

Read more
ransomware avast
“Every organization is vulnerable” - ransomware dominates security threats in 2024, so how can your business stay safe?
A digital representation of a lock
Exploits on the rise: How defenders can combat sophisticated threat actors
Cartoon Phishing
Hackers use GenAI to attack more frequently and effectively
An image of network security icons for a network encircling a digital blue earth.
Why effective cybersecurity is a team effort
Phishing
Corporate executives are being increasingly targeted by AI phishing scams
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Sounding the alarm on AI-powered cybersecurity threats in 2025
Latest in Security
Isometric demonstrating multi-factor authentication using a mobile device.
NCSC gets influencers to sing the praises of 2FA
Sam Altman and OpenAI
OpenAI is upping its bug bounty rewards as security worries rise
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Dangerous new CoffeeLoader malware executes on your GPU to get past security tools
China
Notorious Chinese hackers FamousSparrow allegedly target US financial firms
A digital representation of a lock
NYU website defaced as hacker leaks info on a million students
NHS
NHS IT supplier hit with major fine following ransomware attack
Latest in News
cheap Nintendo Switch game deals sales
Nintendo didn't anticipate that Mario Kart 8 Deluxe was 'going to be the juggernaut' for the Nintendo Switch when it was ported to the console, according to former employees
Three angles of the Apple MacBook Air 15-inch M4 laptop above a desk
Apple MacBook Air 15-inch (M4) review roundup – should you buy Apple's new lightweight laptop?
Witchbrook
Witchbrook, the life-sim I've been waiting years for, finally has a release window and it's sooner than you think
Amazon Echo Smart Speaker
Amazon is experimenting with renaming Echo speakers to Alexa speakers, and it's about time
Shigeru Miyamoto presents Nintendo Today app
Nintendo Today smartphone app is out now on iOS and Android devices – and here's what it does
iPhone 13 mini
The iPhone mini won't be returning, according to rumors – and you think that's a mistake