Cybercrime Automation: Attacker Handoff Time Plummets from 8 Hours to 22 Seconds

Google M-Trends Report Reveals Dramatic Acceleration in Cybercriminal Operations

INFORMATIONAL
March 24, 2026
6m read
Threat IntelligenceSecurity OperationsPhishing

Related Entities

Threat Actors

Akira Qilin

Organizations

Full Report

Executive Summary

The 2025 M-Trends report, published by Google's Mandiant division, paints a picture of a hyper-efficient and specialized cybercrime ecosystem. The most startling finding is the dramatic reduction in the 'initial access to secondary attacker handoff' time, which has collapsed from approximately eight hours in 2022 to a mere 22 seconds in 2025. This indicates a move towards automated deployment of secondary payloads, where initial access brokers (IABs) have pre-arranged partnerships with ransomware groups. The report also identifies a significant rise in social engineering, with voice phishing (vishing) becoming a leading initial access vector, especially for cloud intrusions. Despite this speed, the overall median dwell time (compromise to detection) increased to 14 days, largely due to long-running cyber espionage campaigns.


Threat Overview

This report analyzes trends from over 500,000 hours of Mandiant incident response engagements in 2025. Key findings include:

  • Handoff Acceleration: The time from an IAB gaining access to a ransomware affiliate deploying their payload is now near-instantaneous (22 seconds). This suggests a shift from manual sales on forums to automated, API-driven partnerships between criminal groups.
  • Rise of Vishing: While exploits remain the top initial infection vector (32%), social engineering is gaining fast. Voice phishing (vishing) surged to become the second-leading method at 11% overall and the #1 method for cloud intrusions (23%).
  • Evolving Ransomware Tactics: Ransomware groups like Akira and Qilin are becoming more destructive. They are now systematically targeting and destroying backup infrastructure, identity services (like Active Directory), and virtualization platforms to cripple recovery efforts and increase pressure on victims.
  • Increased Dwell Time: The global median dwell time rose from 10 days in 2024 to 14 days in 2025. This increase is not due to slower detection of ransomware but is skewed by long-tail cyber espionage campaigns and the persistent activity of North Korean IT workers operating under false identities, who had a median dwell time of 122 days.

Technical Analysis

The 22-second handoff time is a game-changer for defenders. It means that by the time an alert for an initial compromise is generated, a ransomware payload may already be executing. This is likely achieved through:

  • Automated Deployment: The IAB's initial access malware (e.g., an infostealer or loader) is configured to immediately download and execute the secondary payload (e.g., Cobalt Strike beacon) from the ransomware affiliate's infrastructure as soon as it establishes a foothold.
  • Integrated Infrastructure: IABs and ransomware groups may be sharing infrastructure or using a common C2 platform that facilitates the rapid transfer of control over the compromised host.

The surge in vishing (T1566.004 - Spearphishing Voice) involves attackers calling employees, often posing as IT support, and tricking them into revealing credentials, approving an MFA prompt, or navigating to a malicious website. This bypasses many email-based security controls.

The tactic of targeting backup and virtualization infrastructure (T1489 - Service Stop, T1562.001 - Disable or Modify Tools) is a direct response to organizations getting better at recovering from backups. By destroying the means of recovery, attackers aim to make paying the ransom the only viable option.

Impact Assessment

  • Shrinking Response Window: The dramatic reduction in handoff time means that prevention and automated blocking are more critical than ever. The window for manual human intervention at the initial access stage has effectively closed.
  • Identity as the New Perimeter: The rise of vishing and other social engineering tactics reinforces that human users are often the weakest link. Security strategies must be identity-centric, focusing on protecting credentials and verifying user actions.
  • Increased Destructiveness: Attacks are no longer just about encryption. The deliberate targeting of recovery systems means that even if a ransom is not paid, the cost and time to rebuild from scratch will be significantly higher.
  • Divergent Threats: The split in dwell times shows that organizations face two distinct types of threats: the fast, noisy 'smash-and-grab' of ransomware and the slow, quiet, persistent intrusion of nation-state espionage.

Detection & Response

  1. Automated Response: With a 22-second handoff, detection must be tied to an automated response. For example, an EDR detection of a known loader should automatically trigger a host isolation action via a SOAR playbook.
  2. Monitor for Vishing Indicators: While difficult, organizations can monitor for signs of vishing campaigns, such as employees calling IT helpdesks about suspicious calls or multiple MFA prompts from a single user account in a short period.
  3. Protect Recovery Infrastructure: Treat backup servers and virtualization management platforms as Tier 0 assets. Monitor them for any anomalous access, and ensure they are segmented from the general network.

Mitigation

  1. Assume Compromise, Automate Containment: Shift the security mindset from pure prevention to rapid containment. Invest in EDR and SOAR technologies that can automatically isolate compromised hosts from the network.
  2. Phish-Resistant MFA: The rise of vishing and MFA fatigue makes phish-resistant MFA (like FIDO2) a critical control for all users.
  3. Harden Backup Architecture: Ensure backups are immutable or stored offline/air-gapped. Access to backup management consoles should be strictly controlled and monitored.
  4. Continuous Employee Training: Training must evolve to cover vishing and other social engineering tactics. Employees should be empowered with a clear process for reporting suspicious calls or requests.

Timeline of Events

1
March 24, 2026
This article was published

MITRE ATT&CK Mitigations

With vishing on the rise, implementing phish-resistant MFA is more critical than ever to protect user identities.

Mapped D3FEND Techniques:

Security awareness training must be updated to specifically address the threat of vishing and social engineering over the phone.

As attackers target backups, ensuring they are immutable or offline is essential for recovery.

Using application control to prevent the execution of unauthorized loaders can break the initial access chain.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

With a 22-second handoff time, the opportunity for manual intervention is gone. The primary defense becomes automated containment. Organizations must leverage Security Orchestration, Automation, and Response (SOAR) platforms integrated with their EDR. When the EDR detects a high-confidence indicator of initial compromise (e.g., execution of a known credential stealer, a suspicious PowerShell download cradle), a SOAR playbook should automatically trigger a network isolation action for the compromised host. This action, executed via the EDR agent or a NAC solution, immediately severs the host's network connections, preventing the secondary payload from being downloaded and stopping lateral movement and ransomware deployment before they can begin. This transforms detection into an active, automated defense.

The M-Trends report's emphasis on vishing as a top initial access vector highlights a critical weakness in many MFA implementations. To counter this, organizations must aggressively move towards phish-resistant MFA. This means deprecating methods vulnerable to social engineering, like SMS and simple push notifications. Instead, mandate the use of FIDO2/WebAuthn-compliant hardware keys or platform authenticators (e.g., Windows Hello). For applications where this is not possible, enable number matching in push notifications. This requires the user to enter a number from the login screen into their app, preventing accidental approvals from vishing-induced prompt bombing. This hardening of the identity perimeter is the most direct defense against the rising tide of social engineering.

To counter the ransomware trend of targeting recovery infrastructure, organizations must harden their backup and virtualization platforms. Treat backup servers and vCenter/Hyper-V managers as Tier 0 assets. This involves several specific actions: placing them in a highly segmented network zone (a 'recovery vault'), ensuring no administrative accounts for the production domain have rights in this vault (to prevent pass-the-hash), enforcing MFA for all access to management consoles, and disabling unnecessary services on these appliances. Furthermore, leverage immutability features in modern backup solutions (like object lock in S3-compatible storage) to make recent backup copies undeletable, even by a compromised backup administrator account. This ensures that even if attackers reach the backup server, they cannot destroy the means of recovery.

Sources & References

SecurityWeek: Cybersecurity News, Insights and Analysis
SecurityWeek (securityweek.com) March 24, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

M-TrendsMandiantGoogleThreat IntelligenceRansomwareVishingDwell TimeInitial Access Broker

📢 Share This Article

Help others stay informed about cybersecurity threats