A new global study by cybersecurity firm Semperis has confirmed a long-held belief in the security community: ransomware attackers strategically time their attacks for holidays and weekends. The "2025 Holiday Ransomware Risk Report" found that 52% of organizations were targeted during these periods, precisely when security oversight is at its lowest. The report reveals that 78% of companies reduce their Security Operation Center (SOC) staff by 50% or more during these times. This data provides quantitative evidence that threat actors are systematically exploiting predictable gaps in human-led security operations to maximize their chances of success.
The study, which surveyed organizations across the U.S., Europe, and Asia-Pacific, highlights several critical findings for security leaders:
As former U.S. National Cyber Director Chris Inglis noted, attackers' "persistence and patience" during these vulnerable times can lead to severe and long-lasting business disruptions.
The report's findings have significant implications for security operations and business continuity planning. The clear trend of attacking during off-hours demonstrates that ransomware groups are not opportunistic but are methodical planners who conduct reconnaissance and choose their moment to strike. The practice of reducing security staff during these periods, while understandable from a human resources perspective, creates a predictable window of vulnerability that attackers are clearly exploiting. This results in slower detection times, delayed response, and ultimately, more damage and higher recovery costs from ransomware incidents.
Strategic:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats