The window of opportunity for defenders to detect and respond to a network intrusion has shrunk to a perilous new low. According to a new threat report from ReliaQuest, the average 'breakout time'—the critical period between an attacker's initial access and their first lateral movement—has been compressed to a mere 18 minutes. This represents a nearly 63% reduction from the 48-minute average observed in 2024. The driving force behind this alarming acceleration is the industrialization of Ransomware-as-a-Service (RaaS), with 80% of analyzed groups now integrating sophisticated automation and AI into their attack workflows. Groups like Qilin are leading this trend with highly customizable and automated platforms, leaving security teams with virtually no time for manual intervention. This evolution demands a fundamental shift in defensive strategies towards automated detection and response to stand any chance against these high-velocity attacks.
The ReliaQuest report paints a grim picture of a hyper-efficient cybercriminal ecosystem. The 18-minute breakout time is not just a statistic; it represents a paradigm shift in how ransomware attacks are executed. Previously, attackers might spend hours or days manually exploring a network. Now, automated scripts execute a pre-defined playbook almost instantaneously upon gaining a foothold.
The report identifies three key pillars of modern RaaS success:
The Qilin ransomware group, which dominated the threat landscape in mid-2025, exemplifies this model. Its platform provides affiliates with a turnkey solution for executing devastating attacks with minimal effort. In response, established players like LockBit are evolving, with the new LockBit 5.0 variant reportedly using AI to randomize attack patterns and evade signature-based detection. Conversely, groups like Medusa, which lack these advanced features, are losing market share. The report also warns of emerging threats like "The Gentlemen" and "DragonForce," who are rapidly gaining prominence by adopting these highly automated models.
The 18-minute attack chain is a testament to operational efficiency. Here’s a plausible automated workflow:
T1190 - Exploit Public-Facing Application). A beacon is established.nltest /dclist:, net group "Domain Admins" /domain, and scanning the local network for high-value targets like file servers and domain controllers (T1087 - Account Discovery).T1003 - OS Credential Dumping).PsExec or WMI (T1021.002 - SMB/Windows Admin Shares). The first successful move to a new host marks the 'breakout.'vssadmin.exe delete shadows) and disable security software before deploying the ransomware payload across the network via GPO or other means (T1486 - Data Encrypted for Impact).The primary impact of this trend is the obsolescence of human-speed incident response for initial containment.
Defending against 18-minute attacks requires a Security Orchestration, Automation, and Response (SOAR) mindset.
powershell.exe which then spawns nltest.exe is a high-confidence indicator. This is an application of D3FEND's Process Spawn Analysis.Mitigation must focus on preventing initial access and building automated defenses.
M1016 - Vulnerability Scanning).M1026 - Privileged Account Management).M1038 - Execution Prevention).Ransomware victim payments hit record low of 23% in Q3 2025, as major RaaS groups shift to high-volume attacks on mid-market firms.
Use EDR/XDR tools with behavioral detection capabilities to identify and block sequences of malicious activity, rather than relying on single indicators.
Implement application allowlisting to prevent unauthorized tools from running. This is highly effective against automated scripts deploying tools like Mimikatz.
Secure privileged credentials to prevent their automated harvesting and use for rapid lateral movement.
Use modern OS features like Credential Guard on Windows to isolate and protect credentials in memory, making them inaccessible to dumping tools.
Mapped D3FEND Techniques:
Given the 18-minute breakout time, human intervention is too slow. Organizations must leverage automated response actions, with Process Termination being a primary tool. This involves configuring EDR and SOAR platforms to automatically kill processes that match high-confidence threat signatures. For example, upon detecting a process attempting to access the LSASS process memory (a hallmark of Mimikatz), the system should be configured to immediately terminate the offending process without waiting for analyst approval. Similarly, if a process executes the vssadmin.exe delete shadows command, it should be killed instantly. This automated, surgical response can disrupt the attacker's automated script at a critical stage, preventing lateral movement or the destruction of backups. While there is a risk of false positives, for well-defined, high-confidence indicators, the benefit of stopping a high-velocity ransomware attack outweighs the risk of minor operational disruption.
To counter rapid lateral movement, automated Host Isolation is a non-negotiable defensive measure. When an EDR solution detects a sequence of events indicative of an automated attack (e.g., initial payload execution followed by network scanning and credential dumping attempts), it must be empowered to automatically trigger a network quarantine of the affected endpoint. This uses the EDR agent to dynamically apply firewall rules that block all network traffic to and from the host, except for communication with the EDR management console. This action effectively severs the attacker's connection and stops their automated script from spreading to other systems. This 'stops the bleeding' and contains the threat to a single machine, transforming a potential enterprise-wide disaster into a manageable single-host incident. This playbook should be the default response for any endpoint that triggers a 'ransomware activity detected' or 'credential dumping detected' alert.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats