TL;DR
- Attackers now transfer access between different threat groups in under 30 seconds
- Global median dwell time climbed to 14 days — attackers are staying hidden longer
- Exploits are the #1 infection vector (32%), targeting internet-facing servers
- Ransomware operators now deliberately attack backup infrastructure to prevent recovery
- 52% of organizations detected breaches internally in 2025, up from 43%
The Speed Collapse: 22 Seconds to Total Compromise
Mandiant's M-Trends 2026 report reveals a terrifying reality: cyberattackers have industrialized their operations to the point where they can hand off access between different threat groups in under 30 seconds [1]. This isn't about faster malware — it's about attackers coordinating like legitimate businesses, with specialists handling initial access, escalation, data theft, and ransomware deployment as a synchronized operation.
Free Resource
Get Our Weekly Cybersecurity Digest
Every Thursday: the threats that matter, what they mean for your business, and exactly what to do. Trusted by SMB owners across Australia.
No spam. No tracking. Unsubscribe anytime. Privacy
Get the Free Cybersecurity Checklist
A practical, no-jargon security checklist for Australian businesses. Download free — no spam, unsubscribe anytime.
Send Me the Checklist →For SMBs, this means the traditional "detect and respond" model is broken. By the time your security team investigates an alert, attackers have already moved through multiple stages of their attack chain. The report documents cases where initial access brokers compromise a network, hand off to ransomware operators, and exfiltration specialists — all within minutes [1].
Why this matters: The window between initial compromise and operational disruption has collapsed. Organizations that rely on manual investigation workflows are now operating at a speed disadvantage that cannot be fixed with more analysts.
Related: AI-Powered Cyberattacks Nearly Doubled in 2025: Here's How SMBs Can Fight Back
Dwell Time is Rising: The Hidden Threat
While attack speed has accelerated, something counterintuitive is happening: attackers are staying hidden longer. Global median dwell time climbed to 14 days in 2025, up from 11 days in 2024 [1]. This increase is driven by:
- Long-term espionage operations by state-sponsored actors
- DPRK-linked IT worker schemes where attackers maintain persistent access for months
- Quiet compromise of legitimate credentials and tools to avoid detection
Longer dwell time means more expensive remediation. Every day an attacker remains undetected increases the complexity of removing them, as they embed themselves in legitimate systems, create backdoors, and establish redundant access paths [1].
The business impact: A 14-day undetected presence gives attackers time to:
- Map your entire network infrastructure
- Exfiltrate sensitive data slowly to avoid detection
- Identify and compromise backup systems
- Establish persistent access that survives basic remediation
The New Ransomware Playbook: Attack Recovery, Not Just Data
Ransomware tactics have evolved dramatically. Operators are no longer focused primarily on data theft for extortion. Instead, they are deliberately targeting recovery infrastructure [1]. This means:
- Attacking backup servers directly to delete or encrypt backups
- Compromising identity services like Active Directory to prevent account recovery
- Targeting virtualization management (VMware vCenter, Hyper-V) to clone and control VMs
- Disabling recovery tools before deploying ransomware
Mandiant documented incidents where threat clusters cloned virtual machines containing single sign-on (SSO) identity providers, secret vaults, and domain controllers. By accessing these powered-off clones, attackers could extract credentials and secrets without triggering security alerts on live systems [1].
The business reality: This shift means ransomware payments are more likely because organizations literally cannot recover. When backups are destroyed and identity systems are compromised, the choice isn't about data protection — it's about business survival.
Related: Ransomware Prevention: A Complete Guide for SMBs
The Infection Vector Breakdown: What's Actually Working
Exploits remain the leading initial infection vector, accounting for 32% of attacks in 2025 [1]. But the breakdown reveals important nuances:
- Exploits: 32% — primarily zero-days affecting internet-facing web application servers
- Voice phishing: 11% — interactive attacks where live operators steer targets in real-time
- Prior compromise: 10% — attackers returning through previously established access
- Stolen credentials: 9% — legitimate credentials bought or stolen on the dark web
- Web compromise: 8% — supply chain attacks and website hijacking
- Insider threat: 6% — malicious or negligent employees
- Email phishing: 6% — traditional mass email campaigns (declining significantly)
- Third-party compromise: 5% — attacks through vendors and partners
The critical insight: Email phishing is no longer a top-observed intrusion vector. Attackers have shifted toward more sophisticated, interactive methods like voice phishing and exploitation of vulnerabilities in public-facing applications [1].
For SMBs, this means investing heavily in email security is addressing yesterday's threat. The real vulnerabilities are:
- Unpatched web-facing applications (SharePoint, SAP, Oracle E-Business Suite)
- Phone-based social engineering (voice phishing)
- Third-party vendor access
- Poor credential hygiene
Industry Breakdown: Who's Being Targeted
The M-Trends 2026 data reveals which industries faced the most investigations [1]:
- High tech: 17% — software and technology companies
- Financial services: 14.6% — banks, insurance, investment firms
- Business and professional services: 13.3% — consulting, legal, accounting
- Healthcare: 11.9% — hospitals, clinics, medical providers
- Retail and hospitality: 7.3% — e-commerce, restaurants, hotels
- Government: 5.8% — federal, state, and local agencies
- Education: 4.6% — schools and universities
- Telecommunications: 4.6% — ISPs and telecom providers
What's missing: Manufacturing, construction, transportation, and other "traditional" industries still face significant risk, but they may be underrepresented because they lack incident response capabilities or don't report breaches publicly.
The lesson for SMBs: industry doesn't protect you. While high-tech and financial services face more attacks, every sector with valuable data or operational technology is a target.
ISO 27001 SMB Starter Pack — $97
Everything you need to start your ISO 27001 journey: gap assessment templates, policy frameworks, and implementation roadmap built for Australian SMBs.
Get the Starter Pack →The Detection Gap: 52% Internal Detection is Progress, But Not Enough
Here's a rare positive finding: 52% of organizations detected breaches internally in 2025, up from 43% in 2024 [1]. External notifications (from law enforcement, CERTs, or cybersecurity companies) dropped from 43% to 34%.
This improvement suggests organizations are getting better at detecting malicious activity themselves. But it also means:
- 48% of organizations still rely on outsiders to tell them they've been breached
- 14% of breaches are discovered only when attackers send ransom notes
- Internal detection doesn't mean fast detection — dwell times are still increasing
The SMB challenge: Smaller organizations rarely have 24/7 security monitoring or dedicated incident response teams. This makes internal detection difficult, often relying on lucky discoveries or obvious symptoms like ransomware messages.
Malware Diversity: 714 New Families in 2025
The threat ecosystem is becoming more diverse. Mandiant tracked 714 new malware families in 2025, up from 632 in 2024, bringing the total to over 6,000 families [1]. Key findings:
- 72% of new malware targets Windows — consistent with previous years
- 12% targets Linux exclusively — stable from 2024
- Backdoors remain the most common category at 36% of observed malware
- Ransomware declined to 10% of observed malware, down from 14% in 2024
- Credential stealers increased to 9% — reflecting the focus on identity attacks
What this means: Signature-based detection is increasingly ineffective. With over 6,000 malware families and hundreds added yearly, defenders cannot rely on known-bad lists. Behavioral detection and anomaly monitoring are now essential.
Related: Identity Attacks Surge: 67% of SMBs Are Unprepared — Here's How to Defend
How SMBs Can Build Resilience Against Industrialized Attacks
The M-Trends 2026 report makes it clear: speed is now the primary defense. Here's how SMBs can respond without enterprise budgets:
1. Prioritize Detection Speed Over Tool Count
- Treat every security alert as a potential indicator of deeper intrusion
- Establish clear escalation paths: who investigates, how fast, and what authority they have
- Consider managed detection and response (MDR) services for 24/7 monitoring
- Reduce alert noise by tuning detection rules and focusing on high-fidelity signals
2. Protect Recovery Infrastructure
- Isolate backups from corporate networks — air-gap critical backups or use immutable storage
- Secure virtualization management — treat VMware vCenter and Hyper-V as Tier-0 assets
- Implement identity protection — enforce MFA, least privilege, and continuous authentication
- Test restoration regularly — verify that backups actually work before you need them
3. Patch What Matters Most
- Internet-facing applications are the #1 entry point — prioritize patching SharePoint, SAP, Oracle, and web servers
- Focus on zero-day vulnerabilities in widely used enterprise platforms
- Establish a patch SLA for critical infrastructure: 48-72 hours maximum
- Monitor vendor security advisories for CVEs in your software stack
4. Harden Identity and Access
- Eliminate shared accounts — every user needs unique credentials
- Enforce MFA everywhere — especially for remote access and admin accounts
- Implement just-in-time access — grant permissions only when needed
- Monitor for unusual activity — impossible travel, anomalous logins, bulk data access
5. Prepare for Faster Incident Response
- Develop and test an incident response plan — tabletop exercises quarterly
- Establish relationships with incident response providers before you need them
- Document your critical systems and recovery priorities
- Consider cyberinsurance to transfer residual risk
The Reality Check: You Can't Out-Spend Attackers, But You Can Out-Smart Them
Mandiant's message is clear: the threat landscape has shifted toward faster, coordinated, and industrialized attacks [1]. Defenders adding more tools to monitor the same telemetry won't close the speed gap.
What works:
- Focus on the attack pathways that actually succeed — exploits, voice phishing, credential theft
- Prioritize what attackers are targeting — backups, identity, virtualization
- Detect and respond faster — treat every alert as a potential early warning
- Assume compromise — design security around detection, not prevention
The organizations that will thrive in this new threat landscape aren't those with the biggest security budgets — they're the ones that accept that attacks are inevitable, downtime is optional, and resilience is about recovery speed, not perfect prevention [2].
FAQ
Mandiant's M-Trends 2026 report documents attackers transferring access between different threat groups in under 30 seconds [1]. This handoff allows initial access brokers, ransomware operators, and data exfiltration specialists to coordinate attacks like legitimate business operations, dramatically compressing the window for defenders to detect and respond.
Global median dwell time climbed to 14 days in 2025, up from 11 days in 2024 [1]. This increase is driven by long-term espionage operations and DPRK-linked IT worker schemes. Longer dwell time means more expensive remediation and gives attackers more time to embed themselves in systems, steal data, and compromise recovery infrastructure.
Exploits are the #1 infection vector at 32%, primarily zero-days affecting internet-facing web application servers [1]. Voice phishing accounts for 11%, prior compromise 10%, stolen credentials 9%, web compromise 8%, insider threat 6%, and email phishing only 6%. Notably, email phishing is no longer a top-observed intrusion vector.
Ransomware operators have shifted from data theft to attacking recovery infrastructure [1]. They deliberately target backup servers, identity services (Active Directory), and virtualization management platforms (VMware vCenter, Hyper-V) to prevent organizations from recovering. This increases pressure to pay because organizations literally cannot restore operations even if they have backups.
52% of organizations detected breaches internally in 2025, up from 43% in 2024 [1]. While this is progress, it means 48% still rely on external notifications from law enforcement, CERTs, or cybersecurity companies, and 14% only discover breaches when attackers send ransom notes.
References
[1] Mandiant Google Cloud, "M-Trends 2026: A Report on Threat Landscape and Tactics," Mandiant, March 2026. [Online]. Available: https://cloud.google.com/security/resources/m-trends
[2] C. Wyatt, "2026 Resilience Risk Index," Absolute Security, March 2026. [Online]. Available: https://www.absolute.com
[3] Kaspersky Security Services, "Anatomy of a Cyber World Global Report 2026," Kaspersky Securelist, March 2026. [Online]. Available: https://securelist.com/global-report-security-services-2026/119233/
[4] PwC, "Annual Threat Dynamics 2026," PwC, March 2026. [Online]. Available: https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/annual-threat-dynamics.html
[5] Cybersecurity Insiders, "2026 Cybersecurity Excellence Awards Winners Announced during RSA Conference," Cybersecurity Insiders, March 2026. [Online]. Available: https://cybersecurity-excellence-awards.com/
[6] Industrial Cyber, "M-Trends 2026 reveals threat landscape shaped by faster, coordinated, and industrialized cyberattacks," Industrial Cyber, March 2026. [Online]. Available: https://industrialcyber.co/reports/m-trends-2026-reveals-threat-landscape-shaped-by-faster-coordinated-and-industrialized-cyberattacks/
[7] Infosecurity Magazine, "Enterprise Cybersecurity Software Fails 20% of the Time, Warns Absolute Security," Infosecurity Magazine, March 2026. [Online]. Available: https://www.infosecurity-magazine.com/news/cybersecurity-software-failure-20/
[8] N-able, "State of the SOC Report 2026," N-able, March 2026. [Online]. Available: https://www.n-able.com/resources/state-of-the-soc-report-2026
Your business doesn't need a enterprise security budget to build resilience. You need smart prioritization, fast detection, and a recovery plan that actually works. At lil.business, we help SMBs implement practical cybersecurity that protects what you've built. Get a free consultation and close your resilience gap.
Work With Us
Ready to strengthen your security posture?
lilMONSTER assesses your risks, builds the tools, and stays with you after the engagement ends. No clipboard-and-leave consulting.
Book a Free Consultation →TL;DR
- Bad hackers are using AI (artificial intelligence) to trick businesses and steal information
- AI helps hackers write perfect emails, create fake identities, and break into computers faster
- But we can fight back with better passwords, special keys, and smart computer programs that watch for trouble
- lilMONSTER helps protect businesses from these AI-powered bad guys
What Is AI, and Why Are Hackers Using It?
Think of AI like a robot brain that's really good at reading, writing, and solving problems. It's like having a super-smart assistant that can help you with homework instantly.
But just like how a magnifying glass can start a fire or help you read small print, AI can be used for good things or bad things. Hackers have figured out they can use AI robot brains to do their work faster and better.
Microsoft (the company that makes Windows) just released a report showing that hackers are using AI at every step of their attacks [1]. It's like giving burglars power tools instead of making them use old-fashioned lockpicks.
How Bad Guys Use AI (Explained Simply)
Step 1: Spying on Their Targets
Imagine you wanted to trick someone. First, you'd need to learn about them, right? Hackers used to have to do all this research by hand, which took a long time.
Now they use AI to:
- Read hundreds of job postings to find companies hiring people
- Look at websites to learn who works where
- Find email addresses and figure out how the company writes them
It's like having a robot assistant who can read everything on the internet in seconds and tell you exactly who to target.
Step 2: Making Fake Emails That Look Real
You know how some scam emails have bad spelling or weird grammar? That's because many hackers don't speak English very well.
AI fixes this problem:
- Writes perfect English with no mistakes
- Sounds friendly and professional—not like a robot
- Personalizes every email so it looks like it's just for you
- Changes the tone to match how your company normally talks
It's like a shapeshifter that can sound like anyone it wants.
Step 3: Building Fake Identities
Some hackers pretend to be real workers to get jobs at companies. They send in fake resumes, do interviews, and get hired—then steal information from inside!
AI helps them:
- Create fake names that sound real for any country
- Write perfect resumes with all the right skills
- Generate fake work history that looks convincing
- Answer interview questions naturally
It's like having a Hollywood special effects team that can make anyone look like a perfect employee.
Step 4: Breaking Into Computers
Hackers use AI to:
- Write computer code that breaks into systems
- Fix mistakes when their code doesn't work
- Test different ways to break in until something works
- Move between languages so their attacks work everywhere
Think of it like a master key that can learn to open any lock by trying thousands of combinations instantly.
Step 5: Stealing and Selling Information
Once hackers break in, AI helps them:
- Read through stolen files super fast to find valuable stuff
- Summarize long documents so they know what's worth selling
- Translate everything into different languages to sell to more bad guys
- Write scary messages to demand money from companies
It's like having a super-fast librarian who can read every book in the library in one minute and tell you which ones are worth stealing.
Related: AI Subscription Hacking: How a $20 Tool Just Breached 10 Government Agencies
A Real Example: The Fake Worker Scheme
Microsoft found a group of hackers from North Korea who used AI to pretend to be IT workers [1]. Here's how they did it:
The Setup:
- AI generates a fake name like "Sarah Kim"
- AI creates a fake resume showing she's a great programmer
- AI writes a perfect cover letter for a job application
- AI helps "Sarah" answer technical interview questions
The Attack:
- Sarah gets hired as a remote worker (she works from home)
- She has access to the company's computer systems
- Instead of doing her job, she steals information
- AI helps her find valuable files and download them
The Problem: The company didn't know they hired a fake worker until it was too late. She had legitimate access—she wasn't hacking from the outside. She was already trusted on the inside.
Why This Is Scary (But We Can Handle It)
The Bad News
More Bad Guys Can Hack Now: Before, you had to be really smart with computers to be a hacker. Now, with AI helping, almost anyone can launch sophisticated attacks. It's like giving everyone a master key instead of just expert locksmiths.
Attacks Happen Faster: What used to take hackers hours or days now takes minutes. Faster attacks mean less time for the good guys to catch them [2].
Perfect Disguises: AI can write emails that sound exactly like your boss, your coworkers, or even your company's CEO. It's much harder to spot the fakes.
The Good News
AI Helps the Good Guys Too: Microsoft and other security companies use AI to catch hackers. It's like having robot guards that never sleep and can spot trouble instantly [1].
We Know What's Coming: Now that we understand how hackers use AI, we can build better defenses. It's like knowing the enemy's playbook before the game starts.
Smart Security Works: Even with AI helping them, hackers still have to get past your defenses. Good security stops them, AI or not.
How to Protect Your Business (Explained for Grownups)
Here's what your parents or business owners should do to stay safe:
1. Use Special Keys Instead of Just Passwords
Passwords alone aren't enough anymore. Businesses should use security keys—little physical devices that plug into computers (like a USB drive). You can't trick a physical key with AI emails.
Think of it like this: A password is like a secret word anyone can say if they overhear it. A security key is like a real key—you have to physically have it to open the door.
2. Watch for Weird Behavior
Smart computer programs can learn how each person normally uses their account. If something looks weird—like logging in from two different countries in one hour—the computer automatically blocks it.
Think of it like this: If your friend suddenly starts speaking a different language and wearing different clothes, you'd know something's wrong, right? Computer programs notice weird stuff too.
3. Check If Remote Workers Are Real
For businesses that hire people to work from home:
- Do video interviews where they have to solve problems live
- Call their old schools and jobs to make sure they're real
- Check their work carefully for the first few months
- Don't give them access to everything at once
Think of it like this: When you meet someone new online, you don't trust them with all your secrets right away. You get to know them first. Businesses should do the same thing.
4. Be Careful with AI Tools
If your business uses AI helper tools:
- Don't type secret information into them
- Only use AI apps that your business has approved
- Tell the IT person if AI asks you to do something weird
Think of it like this: You wouldn't tell a stranger your family's secrets. Don't tell stranger AI programs your business secrets either.
What You Can Do (For Kids and Teens)
Even if you're not running a business, you can help keep things safe:
Be an AI Detective
If you get an email or message that seems weird:
- Check who sent it—even if it says it's from someone you know
- Look for things that don't make sense—like your principal asking you to buy gift cards
- Never share passwords with anyone, even if the message looks real
- Tell a grownup immediately if something seems off
Protect Your Accounts
- Use strong passwords—long phrases are better than short ones
- Turn on two-factor authentication (that's when you need both a password AND a code from your phone)
- Don't click on weird links even if they promise free stuff
- Remember: AI can make fake messages that look super real
Help Your Family
If your parents have a business:
- Remind them about security updates
- Tell them about scams you learn about at school
- Ask if they use security keys instead of just passwords
- Share what you learn about staying safe online
The Big Lesson: We Can Fight Back
Yes, hackers are using AI to be smarter and faster. But that doesn't mean they win.
Think about it like sports:
- When one team gets better equipment, the other team upgrades too
- When runners get faster shoes, the coaches design smarter training
- When cars get faster engines, safety features get better too
Security is the same way. AI helps hackers, but it also helps the people protecting businesses. The good guys have AI too—and there are a lot more good guys than bad guys.
Microsoft. Google. Amazon. Thousands of security companies. Millions of smart people. All working to stop the bad guys.
And businesses like yours can work with companies like lilMONSTER to get protected. You don't have to figure this out alone.
FAQ
Not yet. Right now, hackers still tell the AI what to do. It's like a really smart assistant—it can do the work fast, but the human is still the boss. Someday AI might be able to hack by itself, but that's why we're building defenses now.
Because AI does lots of good things too! It helps doctors diagnose diseases, helps students learn, helps businesses run better, and helps catch bad guys. We wouldn't ban cars because bank robbers use them to drive away—we make security better instead.
Honestly? You probably can't. That's why we don't rely on spotting fake emails anymore. Instead, we use security keys (physical devices) so it doesn't matter if the email is fake—without the physical key, hackers can't get in.
If you have computers, internet, or valuable information, yes—but you're also in danger from regular hackers too. AI just makes existing dangers slightly worse. The good news is that good security stops both regular and AI-powered hackers.
Tell them to:
- Use security keys instead of just passwords
- Install programs that watch for weird behavior on accounts
- Be extra careful when hiring people they've never met in person
- Work with a security company like lilMONSTER who understands AI threats
References
[1] Microsoft Threat Intelligence, "AI as tradecraft: How threat actors operationalize AI," Microsoft Security Blog, March 6, 2026. [Online]. Available: https://www.microsoft.com/en-us/security/blog/2026/03/06/ai-as-tradecraft-how-threat-actors-operationalize-ai/
[2] IBM X-Force, "2026 Threat Intelligence Index," IBM, 2026. [Online]. Available: https://www.ibm.com/reports/threat-intelligence-index-2026
[3] National Cybersecurity Alliance, "AI and Cybersecurity: What Families Need to Know," NCSA, 2025. [Online]. Available: https://staysafeonline.org/ai-families
[4] Cyber Safe Kids, "Understanding AI Safety," CSK, 2025. [Online]. Available: https://www.cybersafekids.com/ai-safety
[5] Common Sense Media, "AI Explained for Kids," CSM, 2025. [Online]. Available: https://www.commonsensemedia.org/ai-for-kids
[6] Google, "Be Internet Awesome: AI Safety," Google, 2025. [Online]. Available: https://beinternetawesome.withgoogle.com/en_us/ai-safety
[7] Stop.Think.Connect, "AI Security Tips," DHS, 2025. [Online]. Available: https://www.stopthinkconnect.org/ai
[8] FBI Safe Online Surfing, "Technology Safety," FBI, 2025. [Online]. Available: https://www.fbi.gov/sos/technology
AI is changing how hackers work, but lilMONSTER is changing how businesses protect themselves. Work with us to build defenses that stop both regular and AI-powered attackers. Talk to us about protecting your business