Skip to content
OVEX TECH
Technology & AI

AI Accelerates Cyberattacks to Under 75 Minutes

AI Accelerates Cyberattacks to Under 75 Minutes

AI Fuels Rapid Cyberattacks, Exploiting Business Tools

Cybercriminals are leveraging artificial intelligence to dramatically speed up their attacks, with new research revealing that data exfiltration can now occur in as little as 72 minutes. A recent report from Palo Alto Networks, analyzing 750 incidents across 50 countries, highlights a terrifying new reality where attackers are using organizations’ own AI tools and cloud infrastructure against them.

The New Attack Timeline

The modern cyberattack, as detailed in the report, begins not with sophisticated hacking, but with the simple acquisition of stolen credentials. Once inside, attackers are using AI assistants and copilots to rapidly map an organization’s entire digital environment within the first 10 minutes. This is a stark contrast to previous methods that required significant time and manual effort to achieve the same level of reconnaissance.

By the 30-minute mark, attackers are exploiting overly permissive identity policies to move laterally across networks. This highlights a critical vulnerability in how access is managed within many organizations. The speed at which they can navigate and escalate privileges is unprecedented.

The staging of sensitive data across endpoints, cloud storage, and Software-as-a-Service (SaaS) applications is then executed using AI-powered scripts by the 60-minute mark. This automated process allows for the efficient aggregation of vast amounts of data before the final exfiltration.

The entire process, from initial entry to data theft, can be completed in under 72 minutes. This alarming pace means that many organizations may not even detect a breach until after their data has already been compromised.

Key Findings and Statistics

  • Accelerated Exfiltration: 22% of all data breaches now result in data exfiltration in under one hour.
  • Identity Weaknesses: 90% of all breaches are attributed to identity-related weaknesses, emphasizing the critical need for robust access controls and credential management.
  • AI as an Enabler: Attackers are using AI to significantly reduce the time required for reconnaissance, lateral movement, and data staging.

Why This Matters

The implications of this accelerated threat landscape are profound. Traditional security measures, which often rely on detecting suspicious activity over longer periods, may become insufficient. The speed of AI-driven attacks demands a fundamental shift in how organizations approach cybersecurity. The report underscores that attackers are not necessarily breaking into systems through complex exploits, but rather logging in through compromised credentials and then using sophisticated, AI-enhanced techniques to achieve their objectives with unprecedented speed.

This trend indicates a growing arms race in cybersecurity, where defenders must also adopt advanced technologies, including AI, to counter these evolving threats. The reliance on stolen credentials and the exploitation of identity management weaknesses suggest that investments in multi-factor authentication, least privilege principles, and continuous identity monitoring are more crucial than ever.

The Path Forward

The Palo Alto Networks report serves as a critical wake-up call. To stay ahead of these rapidly evolving threats, organizations must adapt their security strategies. This includes not only strengthening foundational security practices like identity and access management but also exploring how AI can be utilized for defense. Just as attackers are using AI to their advantage, security teams need to harness AI-powered tools for threat detection, incident response, and proactive vulnerability management.

The report implies that the effectiveness of current defenses is being outpaced by attacker innovation, particularly when amplified by AI. The speed and efficiency with which attackers can now operate necessitate a move towards more automated and intelligent security solutions.


Source: hackers now steal your data in 72 minutes (YouTube)

Leave a Reply

Your email address will not be published. Required fields are marked *

Written by

John Digweed

1,430 articles

Life-long learner.