Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Ransomware activity peaks outside business hours
    Cybersecurity

    Ransomware activity peaks outside business hours

    adminBy adminMarch 1, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Ransomware activity peaks outside business hours
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Intrusions continue to center on credential access and timed execution outside standard business hours. The Sophos Active Adversary Report 2026 analyzes 661 incident response and managed detection and response cases handled between November 1, 2024 and October 31, 2025, spanning organizations in 70 countries.

    The dataset examines how attackers gain access, how quickly they reach key systems, and when ransomware and data theft occur.

    identity driven breaches

    Identity-related root causes as a proportion of all cases covered in the last four years of the Active Adversary Report. (Source: Sophos)

    Identity compromise leads initial access

    Identity related techniques accounted for 67% of root causes across the cases analyzed. The category includes compromised credentials, brute force activity, phishing, and other forms of identity abuse.

    “The most concerning change, meanwhile, has also been years in the making: The dominance of identity-related root causes — brute-force attacks, phishing, and other compromised-credential tactics — for successful initial access. This constellation of tactics leverages weaknesses that can’t be addressed by simple patch hygiene and occasionally acts as a bonus multiplier for attacks in progress,” Sophos researchers explained.

    The proportion places credential misuse at the center of intrusion activity observed during the reporting period. Identity-based access represented the most frequently identified starting point in the incidents reviewed.

    The persistence of identity compromise within industries reflects the continued exposure of authentication systems and user accounts. Credential-related access methods appeared more often than vulnerability exploitation or other technical entry points in the dataset.

    Movement to directory services happens quickly

    After initial access, attackers frequently pivot toward centralized identity infrastructure. The median time to reach Active Directory was 3.4 hours from the start of the intrusion. That early window represents the period when containment has the greatest potential to limit downstream impact.

    AD remains a high value target because it governs authentication, authorization, and policy enforcement across large portions of enterprise environments. Gaining a foothold there expands visibility into user accounts, group memberships, and administrative pathways.

    The speed reflected in the 3.4 hour median underscores how compressed early attack timelines have become. The interval between credential misuse and directory level access can fit within a single work shift.

    Throughout the dataset, median dwell time was three days. That figure measures the time between the start of malicious activity and detection by defenders.

    A three day window provides room for reconnaissance, credential harvesting, privilege escalation, and staging for ransomware or data theft. It reflects the gap between initial compromise and the point when suspicious behavior surfaces through monitoring tools or investigative response.

    Ransomware deployment concentrates outside business hours

    Timing patterns show that the most disruptive stages of ransomware incidents often occur when organizations are operating with reduced staffing. In 88% of ransomware cases, encryption was deployed during non business hours.

    Data exfiltration followed a similar pattern, with 79% of theft activity also occurring outside the typical workday.

    Off hours deployment increases the likelihood that encryption or large scale data transfers proceed without immediate interruption. It places emphasis on monitoring coverage that extends beyond standard schedules.

    AI shows incremental impact

    Expectations of a dramatic shift driven by generative AI did not materialize in the cases reviewed.

    The findings describe generative AI as adding speed, volume, and noise to the threat landscape. Improvements in phishing language, grammar, and personalization reflect that influence. Attackers can produce more polished messages and iterate quickly throughout campaigns, increasing the scale of outreach without changing the underlying access methods.

    Generative tools also lower the technical barrier for creating convincing lures, scripts, and fraudulent communications. That effect broadens participation in social engineering activity and supports higher campaign throughput. The technology acts as a force multiplier for existing techniques.

    “While it seems inevitable that GenAI will someday cross the threshold into fully autonomous attacks, and possibly generate novel attack vectors and malware along the way, we aren’t there yet. In the short term, the attacker gains will be — again — speed, volume, and democratization,” the researchers said.

    The dataset does not identify autonomous AI-driven campaigns replacing established tactics. Identity compromise, directory targeting, ransomware deployment, and data theft remained central elements in the cases examined.

    Activity Business hours peaks ransomware
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleMWC 2026: AI, foldables, satellite connectivity, and memory crisis
    Next Article Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms
    admin
    • Website

    Related Posts

    SD-WAN 0-Day, Critical CVEs, Telegram Probe, Smart TV Proxy SDK and More

    March 3, 2026

    AI went from assistant to autonomous actor and security never caught up

    March 3, 2026

    How Microsoft, partners are tackling ‘huge, huge task’ of making security software safer

    March 3, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Best High-Yield Checking Accounts for March 2026

    March 3, 2026

    This amazing ESP32 projector integrates with Home Assistant and displays whatever you want

    March 3, 2026

    SD-WAN 0-Day, Critical CVEs, Telegram Probe, Smart TV Proxy SDK and More

    March 3, 2026

    Google Clarifies How It Picks Thumbnails For Search, Discover

    March 3, 2026
    Categories
    • Blogging (32)
    • Cybersecurity (572)
    • Privacy & Online Earning (80)
    • SEO & Digital Marketing (357)
    • Tech Tools & Mobile / Apps (709)
    • WiFi / Internet & Networking (103)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Best High-Yield Checking Accounts for March 2026

    March 3, 2026

    This amazing ESP32 projector integrates with Home Assistant and displays whatever you want

    March 3, 2026

    SD-WAN 0-Day, Critical CVEs, Telegram Probe, Smart TV Proxy SDK and More

    March 3, 2026
    Most Popular
    • Best High-Yield Checking Accounts for March 2026
    • This amazing ESP32 projector integrates with Home Assistant and displays whatever you want
    • SD-WAN 0-Day, Critical CVEs, Telegram Probe, Smart TV Proxy SDK and More
    • Google Clarifies How It Picks Thumbnails For Search, Discover
    • These budget-friendly wireless earbuds deliver a pleasant experience while still being easy on the wallet
    • AI went from assistant to autonomous actor and security never caught up
    • Segway Cube 1000 Portable Power Station hits lowest price ever!
    • How Microsoft, partners are tackling ‘huge, huge task’ of making security software safer
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.