The 2025 M-Trends report, published by Google's Mandiant division, paints a picture of a hyper-efficient and specialized cybercrime ecosystem. The most startling finding is the dramatic reduction in the 'initial access to secondary attacker handoff' time, which has collapsed from approximately eight hours in 2022 to a mere 22 seconds in 2025. This indicates a move towards automated deployment of secondary payloads, where initial access brokers (IABs) have pre-arranged partnerships with ransomware groups. The report also identifies a significant rise in social engineering, with voice phishing (vishing) becoming a leading initial access vector, especially for cloud intrusions. Despite this speed, the overall median dwell time (compromise to detection) increased to 14 days, largely due to long-running cyber espionage campaigns.
This report analyzes trends from over 500,000 hours of Mandiant incident response engagements in 2025. Key findings include:
The 22-second handoff time is a game-changer for defenders. It means that by the time an alert for an initial compromise is generated, a ransomware payload may already be executing. This is likely achieved through:
The surge in vishing (T1566.004 - Spearphishing Voice) involves attackers calling employees, often posing as IT support, and tricking them into revealing credentials, approving an MFA prompt, or navigating to a malicious website. This bypasses many email-based security controls.
The tactic of targeting backup and virtualization infrastructure (T1489 - Service Stop, T1562.001 - Disable or Modify Tools) is a direct response to organizations getting better at recovering from backups. By destroying the means of recovery, attackers aim to make paying the ransom the only viable option.
With vishing on the rise, implementing phish-resistant MFA is more critical than ever to protect user identities.
Mapped D3FEND Techniques:
Security awareness training must be updated to specifically address the threat of vishing and social engineering over the phone.
As attackers target backups, ensuring they are immutable or offline is essential for recovery.
Using application control to prevent the execution of unauthorized loaders can break the initial access chain.
Mapped D3FEND Techniques:
With a 22-second handoff time, the opportunity for manual intervention is gone. The primary defense becomes automated containment. Organizations must leverage Security Orchestration, Automation, and Response (SOAR) platforms integrated with their EDR. When the EDR detects a high-confidence indicator of initial compromise (e.g., execution of a known credential stealer, a suspicious PowerShell download cradle), a SOAR playbook should automatically trigger a network isolation action for the compromised host. This action, executed via the EDR agent or a NAC solution, immediately severs the host's network connections, preventing the secondary payload from being downloaded and stopping lateral movement and ransomware deployment before they can begin. This transforms detection into an active, automated defense.
The M-Trends report's emphasis on vishing as a top initial access vector highlights a critical weakness in many MFA implementations. To counter this, organizations must aggressively move towards phish-resistant MFA. This means deprecating methods vulnerable to social engineering, like SMS and simple push notifications. Instead, mandate the use of FIDO2/WebAuthn-compliant hardware keys or platform authenticators (e.g., Windows Hello). For applications where this is not possible, enable number matching in push notifications. This requires the user to enter a number from the login screen into their app, preventing accidental approvals from vishing-induced prompt bombing. This hardening of the identity perimeter is the most direct defense against the rising tide of social engineering.
To counter the ransomware trend of targeting recovery infrastructure, organizations must harden their backup and virtualization platforms. Treat backup servers and vCenter/Hyper-V managers as Tier 0 assets. This involves several specific actions: placing them in a highly segmented network zone (a 'recovery vault'), ensuring no administrative accounts for the production domain have rights in this vault (to prevent pass-the-hash), enforcing MFA for all access to management consoles, and disabling unnecessary services on these appliances. Furthermore, leverage immutability features in modern backup solutions (like object lock in S3-compatible storage) to make recent backup copies undeletable, even by a compromised backup administrator account. This ensures that even if attackers reach the backup server, they cannot destroy the means of recovery.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats