“M-Trends 2026: Initial Access Time Plummets to Record Low of 22 Seconds

M-Trends-2026-Initial-Access-Time-Plummets-to-Record-Low-of-22-Seconds

Initial Access Handoff Speed Increases Dramatically Over Past Few Years

The time frame between initial system access and the transfer of control to a secondary threat group has dramatically shortened in recent years.

Average Time Frame Decreases from Hours to Seconds

In 2022, this period averaged eight hours, but by 2025, it had shrunk to just 22 seconds.

According to research, this rapid change suggests closer collaboration between initial access providers and secondary groups, possibly through automated processes where initial access brokers directly deliver malware on behalf of secondary groups rather than listing available access on cybercrime platforms.

Infection Vectors Shift Towards Exploits

Infection vectors have shifted, with exploits now accounting for 32% of cases, surpassing phishing, prior compromise, and stolen credentials.

  • Phishing has declined from 22% in 2022 to just 6% in 2025.
  • The top vulnerabilities exploited included the SAP NetWeaver vulnerability (CVE-2025-31324), the Oracle EBS flaw (CVE-2025-61882), and the SharePoint flaw (CVE-2025-53770).

Improvement in Incident Discovery Rates

Incident discovery rates have improved, with breaches detected internally in 52% of cases and externally in 34%.

Dwell times, however, remain a concern, with a median duration of 14 days in 2025, a slight increase from previous years.

This is partly attributed to sophisticated attackers like North Korean IT workers and cyberespionage actors who aim to evade detection for extended periods.

Financial Motives Drive Approximately 30% of Attacks

Financial motives drive approximately 30% of attacks, while 40% involve data theft.

  • High-tech companies are the primary targets, followed by those in the financial, business services, and healthcare sectors.
  • The emergence of new malware families continues, with 714 identified in 2025, including those targeting Linux and macOS.

Cloud-related compromises are increasingly prevalent, with voice phishing being the most common initial vector, mainly attributed to ShinyHunters and Scattered Spider activity.

Regional Trends Show Higher Risks in Certain Countries

The global threat landscape demands constant vigilance and adaptation from organizations, requiring them to invest in robust security measures to protect against evolving threats.


Blog Image

About Author

en_USEnglish