AI is shrinking attacker breakout time to four minutes, report says

March 21, 20262 min read2 sources
Share:
AI is shrinking attacker breakout time to four minutes, report says

Attackers can now move from initial access to lateral movement in as little as four minutes, with data exfiltration starting in under 10 minutes in some cases, according to research cited by ReliaQuest and reported by Infosecurity Magazine. The finding points to a sharp reduction in the time defenders have to detect and contain intrusions before attackers spread through an environment or begin stealing data.

The report does not tie the trend to a single malware family or vulnerability. Instead, it describes a broader shift toward AI-assisted and automated workflows that speed up familiar attack steps: phishing, credential theft, reconnaissance, privilege discovery, lateral movement and exfiltration. In practice, that means attackers are not necessarily using new techniques so much as executing old ones faster and at lower cost.

That distinction matters. A four-minute breakout time often suggests attackers already have valid credentials, are abusing identity systems, or are operating in poorly segmented environments. It also reflects the growing use of automation after initial compromise, especially in cloud and SaaS-heavy networks where discovery and data access can happen quickly. Security teams relying on manual triage may simply not have enough time to respond.

The wider industry has been warning about the same pattern. Microsoft’s recent threat reporting has highlighted how AI is improving phishing quality, scaling social engineering and accelerating attacker workflows, especially around identity compromise. ReliaQuest’s figures add urgency to that trend by showing how little time may exist between a successful login and meaningful damage.

For defenders, the takeaway is less about AI hype and more about operational speed. Organizations with exposed remote access, weak MFA, poor visibility, or flat networks face the highest risk when attackers can move in minutes. Faster containment, stronger identity controls, phishing-resistant authentication and tighter segmentation are likely to matter more than any single tool, including a VPN, if attackers are already inside.

ReliaQuest’s claim is based on observed threat activity rather than a named victim case, and the figures may not apply equally across all sectors. Still, the direction is clear: the window between compromise and impact is getting smaller.

Share:

// SOURCES

// RELATED

‘Copy Fail’ is a real Linux security crisis wrapped in AI slop

A critical, actively exploited Linux kernel flaw (CVE-2024-1086) allows root access, but the disclosure was marred by controversial AI-generated text.

6 min readMay 5

Nearly every Linux system built since 2017 vulnerable to ‘Copy Fail’ flaw

A critical flaw, CVE-2024-5219, in the Linux kernel since 2017 allows local attackers to gain root access. Admins are urged to patch immediately.

6 min readMay 2

A critical flaw in 911 systems could allow attackers to disrupt emergency services

A critical 9.8 CVSS vulnerability (CVE-2024-6074) in Intrado 911 gateways allows attackers to disrupt emergency services. Learn how to patch it.

6 min readApr 27

Former ransomware negotiator pleads guilty in BlackCat conspiracy, exposing a critical insider threat

A former ransomware negotiator has pleaded guilty to conspiring with the BlackCat group, using his insider knowledge to help them attack U.S. companie

7 min readApr 25