{"id":43895,"date":"2026-02-24T22:07:18","date_gmt":"2026-02-24T14:07:18","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/24\/ai-accelerates-attacker-breakout-time-to-just-four-minutes-infosecurity-magazine\/"},"modified":"2026-02-24T22:07:18","modified_gmt":"2026-02-24T14:07:18","slug":"ai-accelerates-attacker-breakout-time-to-just-four-minutes-infosecurity-magazine","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/24\/ai-accelerates-attacker-breakout-time-to-just-four-minutes-infosecurity-magazine\/","title":{"rendered":"AI Accelerates Attacker Breakout Time to Just Four Minutes &#8211; Infosecurity Magazine"},"content":{"rendered":"<p>AI is helping threat actors to accelerate attacks, but it can also empower incident responders to quickly contain threats, ReliaQuest has claimed in a new report.<\/p>\n<p>The firm&#39;s&nbsp;<em>Annual Cyber-Threat Report 2026 <\/em>is based on an analysis of customer incidents.<\/p>\n<p>It found that breakout time last year took on average just 34 minutes;&nbsp;29% quicker than in 2024. The fastest ever recorded time taken from access to lateral movement was just four minutes &ndash; 85% faster than the year before.<\/p>\n<p>The fastest recorded exfiltration time was just six minutes; down from 4 hours 29 minutes in 2024.<\/p>\n<p>ReliaQuest said these stats can be explained by the growing use of automation and AI, with 80% of ransomware groups using one or both in their attacks last year.<\/p>\n<p>AI is also being used prior to attacks, the report claimed. It can help threat actors with reconnaissance by automating the analysis of social media profiles, corporate websites&nbsp;and public data sources in order to identify high-value targets and draft convincing social engineering scripts.<\/p>\n<p><a href=\"https:\/\/www.infosecurity-magazine.com\/news\/automation-vulnerability\/\" target=\"_blank\"><em>Read more on AI-driven threats: Automation and Vulnerability Exploitation Drive Mass Ransomware Breaches.<\/em><\/a><\/p>\n<p>Elsewhere, the report revealed that a quarter of attacks used social engineering for initial access last year, with <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/clickfix-attacks-surge-2025\/\" target=\"_self\">ClickFix <\/a>responsible for delivering most (59%) of the top malware families.<\/p>\n<p>The social engineering technique is also the reason why drive-by-compromise is now the top initial access technique, just ahead of phishing.<\/p>\n<h2><strong>Common Security Failures<\/strong><\/h2>\n<p>ReliaQuest also revealed why many incident responders are struggling to match the speed and sophistication of modern threat groups. The most common security control failures it found in 2025 were:<\/p>\n<ul>\n<li>Insufficient\u202f logging\u202fwhich allows attacks to go undetected<\/li>\n<li>Unmanaged devices\u202fwithout security controls like endpoint protection or monitoring agents<\/li>\n<li>Insecure VPNs lacking MFA or device-based certificates, which allow attackers to exploit stolen credentials<\/li>\n<li>External exposure\u202fvia vulnerabilities in internet-facing devices<\/li>\n<li>Helpdesk procedural flaws\u202fwhich make organizations easy targets for social engineering attacks<\/li>\n<li>Poor password policy and controls such as weak, reused, or poorly rotated passwords, and gaps in MFA and local admin password management, enabling quick privileged access and lateral movement<\/li>\n<li>Overprivileged and misconfigured cloud accounts, enabling access to these environments<\/li>\n<\/ul>\n<h2><strong>Fighting AI with AI<\/strong><\/h2>\n<p>Mike McPherson, SVP of GreyMatter Operations at&nbsp;ReliaQuest, said AI and automation have &ldquo;changed the game&rdquo; in cybersecurity &ndash; for attackers and defenders.<\/p>\n<p>&ldquo;Thankfully defenders can outperform adversaries with agentic AI and achieve an average containment time of four minutes. This speed is essential to rival the breakout times observed this year &ndash; a race that manual response, at 16 hours on average without automation, cannot win,&rdquo; he continued.<\/p>\n<p>&ldquo;Agentic AI enables organizations to move to predictive security &ndash; by analyzing vast datasets of rich threat intelligence, agents can adapt this intel to a customer&rsquo;s unique environment and close gaps before a threat actor may attack.&rdquo;<\/p>\n<p>ReliaQuest urged network defenders to ensure all devices and access paths are visible to their security operations (SecOps) teams &ndash; especially edge devices. It added that they must continuously manage risk across the external attack surface by maintaining a current inventory of assets and remediating any new exposures.<\/p>\n<p>Finally, CISOs should strengthen identity controls, with high-assurance verification for helpdesk resets and identity changes, minimal standing privileges, and phishing-resistant privileged access.<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>AI is helping threat actors to accelerate attacks, but  [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-43895","post","type-post","status-publish","format-standard","hentry","category--infosecurity-magazine"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43895","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=43895"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43895\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=43895"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=43895"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=43895"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}