AI Tools

AI Cyber Attacks: 22-Second Handoffs & Human Weakness

The speed of cyber warfare has just lurched into hyperdrive. Attackers are now handing off compromised networks in mere seconds, thanks to AI, but the human element remains the ultimate weak link.

AI Attacks Accelerate: 22 Seconds to Breach [Mandiant Report] — The AI Catchup

Key Takeaways

  • Cyberattackers can now hand off compromised networks in as little as 22 seconds, a dramatic acceleration from previous years.
  • Despite AI advancements, human and systemic failures remain the primary cause of successful network breaches.
  • Attackers are evolving beyond data encryption to actively destroying backup capabilities, necessitating more resilient data protection.

The headline-grabbing stat you need to see? In 2022, it took attackers more than eight hours to hand off a compromised network. By 2025, thanks to the relentless march of AI, that window has shrunk to an astonishing 22 seconds. Think about that. Twenty-two seconds. That’s faster than you can brew a cup of coffee, faster than you can blink. It’s the new speed of cyberwarfare, and it’s absolutely breathtaking.

This isn’t just about faster keyboards; it’s a fundamental platform shift in how the digital battleground operates. Mandiant, a cybersecurity firm now under the Google Cloud umbrella, has been on the front lines of this escalating conflict, and their latest report paints a vivid, almost sci-fi picture of the threats facing enterprise networks today. It’s a world where machines are the primary weapon, but flawed humans are still the easiest target.

The AI Arms Race: Machines on the Attack

Here’s the core paradox: attackers are wielding AI tools that operate at speeds unimaginable to their human counterparts. Conversely, defenders are increasingly turning to automated systems to detect and repel these lightning-fast incursions. It’s a high-stakes game of digital chess, played at hyper-speed, with the fate of sensitive data hanging in the balance.

This new breed of attacker is employing a sophisticated ‘division of labor’ model. Imagine a highly organized, almost factory-like approach to breaking into your company. One group uses low-impact, almost mundane techniques—think malicious ads or fake software updates—to simply get a foot in the door. Once that initial access is secured, they don’t linger. They immediately hand off the compromised target to a secondary group, who then go deeper, armed with more advanced tools and malicious intent. And this handoff, as we’ve seen, now happens in the blink of an eye.

We’re also seeing zero-day exploits—those devastating vulnerabilities for which no patch exists yet—being weaponized at an alarming rate. The average time to exploit such a flaw has plummeted to just seven days. Seven days before a vendor can even get a patch out, attackers are already finding and using these critical weaknesses.

Who’s Who in the Digital Shadows?

Mandiant breaks down the perpetrators into two main camps, each with its own modus operandi and pace. On one side, you have the cybercriminals, pure and simple. Their goal is financial gain, and they’re typically wielding ransomware. They’re optimized for immediate impact and denial of recovery—making sure you can’t get your data back, ever.

On the other side of the spectrum are the state-sponsored espionage groups, or sophisticated insider threats. These aren’t about quick cash grabs. They are optimized for extreme persistence and stealth. Their objective is long-term, undetected access, often using unmonitored edge devices and native network functionalities to stay hidden. Their ‘dwell times’—the period from initial intrusion to detection—can stretch for weeks, even months. For espionage, a median dwell time of 122 days is not uncommon. They’re not breaking down the front door; they’re settling in for a long stay in the attic.

The report highlights that the high-tech and financial sectors are currently bearing the brunt of these attacks, accounting for over 30% of all intrusions. But frankly, no industry is truly safe.

The Human Factor: Still the Weakest Link

Despite all this talk of AI and advanced automation, the report offers a stark reminder: humans remain the center of gravity in almost every battle. We are, unequivocally, the weak point. Even as attackers weaponize AI for reconnaissance and malware development—like the QUIETVAULT stealer actively searching for AI command-line tools to pilfer credentials—the report stresses that “we do not consider 2025 to be the year where breaches were the direct result of AI. From our view on the frontlines, the vast majority of successful intrusions still stem from fundamental human and systemic failures.”

This isn’t an indictment of AI; it’s a proof to the persistent vulnerabilities in human behavior and organizational processes. Social engineering, particularly highly interactive voice-based attacks targeting IT help desks to bypass multi-factor authentication (MFA), is still a disturbingly effective vector. The bad guys are smart enough to know that sometimes, the quickest way into a secure system is by convincing a person to let them in.

Fortifying the Digital Castle Walls

So, how do we stand a fighting chance against this increasingly automated, increasingly fast-moving threat landscape? The Mandiant report outlines a path forward, and it’s less about flashy new gadgets and more about strong, fundamental security practices.

First, organizations need to improve their internal visibility. The good news here is that companies are getting better at spotting intrusions themselves. In 2025, a full 52% of detected breaches were identified internally, a significant jump from 43% in the previous year. The sooner you know you’ve been compromised, the sooner you can start cleaning up the mess and preventing further damage.

Second, attackers are evolving their tactics by destroying your ability to recover. Ransomware groups aren’t just encrypting data anymore; they’re actively targeting and deleting backup objects from cloud storage, and even encrypting the underlying virtualization storage layers. This is a critical shift: they’re not just stealing your valuables; they’re torching the house so you can’t rebuild. This necessitates a move towards immutable backups and resilient data protection strategies that resist direct manipulation.

Third, embrace Zero Trust principles. This isn’t just a buzzword; it’s a security model that assumes no user or device can be trusted by default, regardless of their location. Every access request must be verified, authenticated, and authorized. This drastically reduces the impact of a single compromised credential or device, making those lightning-fast handoffs far less effective.

Fourth, invest in sophisticated threat detection and response (XDR) platforms. These tools, often AI-powered themselves, can correlate alerts from various security layers—endpoints, networks, cloud—to provide a more holistic view of potential threats. They can identify subtle anomalies that indicate sophisticated, low-and-slow attacks or, conversely, rapid, automated assaults.

Finally, and perhaps most importantly, continuous security awareness training for employees is non-negotiable. Yes, humans are the weak link, but they can also be your strongest defense. Regular, engaging training that focuses on identifying phishing attempts, social engineering tactics, and the importance of strong password hygiene can significantly fortify that human firewall.

The landscape of cyber warfare is changing at an unprecedented pace, driven by the accelerating capabilities of AI. It’s an exciting, if terrifying, time. But by understanding the new threats and implementing these fundamental defenses, organizations can move from being reactive victims to proactive defenders in this new era of high-speed digital conflict.


🧬 Related Insights

Written by
theAIcatchup Editorial Team

AI news that actually matters.

Worth sharing?

Get the best AI stories of the week in your inbox — no noise, no spam.

Originally reported by ZDNet - AI

Stay in the loop

The week's most important stories from The AI Catchup, delivered once a week.