AI is shrinking attacker breakout time to four minutes, report says

March 21, 20262 min read2 sources
Share:
AI is shrinking attacker breakout time to four minutes, report says

Attackers can now move from initial access to lateral movement in as little as four minutes, with data exfiltration starting in under 10 minutes in some cases, according to research cited by ReliaQuest and reported by Infosecurity Magazine. The finding points to a sharp reduction in the time defenders have to detect and contain intrusions before attackers spread through an environment or begin stealing data.

The report does not tie the trend to a single malware family or vulnerability. Instead, it describes a broader shift toward AI-assisted and automated workflows that speed up familiar attack steps: phishing, credential theft, reconnaissance, privilege discovery, lateral movement and exfiltration. In practice, that means attackers are not necessarily using new techniques so much as executing old ones faster and at lower cost.

That distinction matters. A four-minute breakout time often suggests attackers already have valid credentials, are abusing identity systems, or are operating in poorly segmented environments. It also reflects the growing use of automation after initial compromise, especially in cloud and SaaS-heavy networks where discovery and data access can happen quickly. Security teams relying on manual triage may simply not have enough time to respond.

The wider industry has been warning about the same pattern. Microsoft’s recent threat reporting has highlighted how AI is improving phishing quality, scaling social engineering and accelerating attacker workflows, especially around identity compromise. ReliaQuest’s figures add urgency to that trend by showing how little time may exist between a successful login and meaningful damage.

For defenders, the takeaway is less about AI hype and more about operational speed. Organizations with exposed remote access, weak MFA, poor visibility, or flat networks face the highest risk when attackers can move in minutes. Faster containment, stronger identity controls, phishing-resistant authentication and tighter segmentation are likely to matter more than any single tool, including a VPN, if attackers are already inside.

ReliaQuest’s claim is based on observed threat activity rather than a named victim case, and the figures may not apply equally across all sectors. Still, the direction is clear: the window between compromise and impact is getting smaller.

Share:

// SOURCES

// RELATED

Most 'AI SOCs' are just faster triage, and that's not enough

Many AI security tools only speed up alert analysis, failing to reduce analyst workload. Experts argue real gains require AI that automates response a

2 min readApr 17

ZionSiphon malware designed to sabotage water treatment systems

A new proof-of-concept malware, ZionSiphon, demonstrates how attackers can sabotage water treatment plants by manipulating industrial control systems.

2 min readApr 17

ThreatsDay bulletin: A deep dive into the Defender 0-day, SonicWall attacks, and a 17-year-old Excel flaw

This week’s threat bulletin is a heavy one. We analyze the critical Microsoft Defender 0-day, a massive SonicWall brute-force campaign, and a 17-year-

6 min readApr 17

Microsoft Defender's 'RedSun' zero-day: A researcher's protest and a threat to Windows systems

A researcher's protest exposed a critical zero-day in Microsoft Defender, allowing attackers full system control. Here's the technical breakdown and h

7 min readApr 17