Skip to content
News

Sophos 2025 Active Adversary Report: Over Half of Attacks Use Valid Credentials as Cyber Threats Accelerate

Introduction

TheΒ 2025 Sophos Active Adversary ReportΒ delivers a sobering analysis of today’s cyber threat landscape. Based on overΒ 400 real-world casesΒ from Sophos’ Incident Response (IR) and Managed Detection and Response (MDR) services in 2024, the report reveals a stark reality: attackers are getting faster, smarter, and more efficient β€” often using legitimate tools and stolen credentials to breach systems in hours, not days.

The findings paint a picture of a cyber battlefield where time is a critical weapon. Threat actors now move from breach to data exfiltration in justΒ three days, and in more thanΒ half of all cases (56%), they gain access throughΒ valid loginsΒ β€” such as compromised credentials used with exposed remote access tools like VPNs or firewalls.

Below is a comprehensive breakdown of the report’s major findings and what they mean for cybersecurity teams and organizational leadership globally.

1. Attackers Love Your Logins: Valid Credentials Are the Top Vector

In both MDR and IR cases, attackers gained initial access inΒ 56% of incidentsΒ by exploitingΒ external remote servicesusingΒ valid credentials. This marks the second year in a row whereΒ compromised credentialsΒ were theΒ number one root causeΒ of breaches, accounting forΒ 41% of all attacks.

Other Initial Access Methods:

  • Exploited vulnerabilities: 21.79%
  • Brute force attacks: 21.07%

Sophos’ data showed a close relationship betweenΒ external remote services (71% of cases)Β andΒ valid accounts (78% when combined), highlighting a continued overreliance on easily exploitable login systems, especially when MFA (multifactor authentication) is missing β€” which it was inΒ 63% of breached organizations.

2. From Breach to Exfil in 3 Days: The Blazing Speed of Modern Attacks

Sophos’ X-Ops team found that attackers areΒ exfiltrating data in a median time of 72.98 hours (just over 3 days). Alarmingly, there is only aΒ 2.7-hour gapΒ between the moment data is exfiltrated and when the attack is detected in ransomware and extortion cases.

This speed compresses response windows, forcing defenders to move quickly or risk full-scale compromise.

3. Attackers Target Active Directory Within 11 Hours

Attackers prioritize domain dominance fast: theΒ median time between initial access and first attempt at compromising Active DirectoryΒ was justΒ 11 hours.

With 62% of compromised AD servers runningΒ out-of-support operating systems, attackers face little resistance. Gaining control of AD allows them to move laterally and escalate access almost instantly.

4. Dwell Time Hits Record Low in MDR Cases

Median Dwell Time Across All Cases:

  • Overall: 2 days (down from 4 in 2023)
  • IR cases: 7 days
    • Ransomware: 4 days
    • Non-ransomware: 11.5 days
  • MDR cases:
    • Ransomware: 3 days
    • Non-ransomware: 1 day

These figures show howΒ proactive monitoring significantly reduces dwell time, limiting the window for attackers to inflict damage.

5. Ransomware Payloads Dropped After-Hours

Sophos found thatΒ 83% of ransomware binariesΒ were droppedΒ outside the targets’ local business hours, reinforcing the need forΒ 24/7 monitoring. These overnight attacks often allow adversaries to operate undetected until damage is already done.

6. RDP Abuse Remains Rampant

Remote Desktop Protocol (RDP)Β was involved inΒ 84%Β of all cases β€” mostly used forΒ internal lateral movement. Despite repeated warnings, many organizations still leave RDP ports exposed or insufficiently restricted.

Sophos recommends:

  • Closing exposed RDP ports
  • ApplyingΒ least privilegeΒ access
  • EnforcingΒ MFA
  • Monitoring logins for anomalies (e.g., unexpected hostnames or time zones)

7. Case Study: The High Cost of Business Process Delays

One highlighted MDR case details a company breachedΒ three times in 14 monthsΒ via a vulnerableΒ FortiGate VPN appliance running aΒ 14-year-old firmware. Despite repeated recommendations, business process constraints delayed patching β€” and ransomware actors struck again.

In the final attack, ransomware encrypted the entire estate justΒ nine daysΒ after a previous incident. The same compromised service account was still active. Only then was the VPN disabled.

This example underscores howΒ business process failuresΒ can enable cybercriminals to return and succeed β€” again and again.

8. Attackers’ Toolkits Are Evolving: Goodbye Cobalt Strike, Hello Impacket

Sophos recorded aΒ dramatic rise in Impacket usage, especially tools like:

  • wmiexec.pyΒ (35% of attacks)
  • secretsdump.pyΒ (used for credential dumping)

By contrast,Β Cobalt Strike, once a staple of ransomware operations, fell to justΒ 7.5% of cases, down from 25% in earlier years. This decline is attributed to improved detection and blocking.

9. LOLBins Continue to Be a Threat

Living-off-the-land binaries (LOLBins)Β β€” legitimate Windows tools used maliciously β€” sawΒ a 126% increaseΒ in unique binaries abused.

Top LOLBins included:

  • cmd.exe
  • wevtutil.exeΒ (used to delete logs)
  • notepad.exeΒ (used to read plaintext passwords)

Attackers continue to use built-in tools to avoid detection, making endpoint behavior monitoring more critical than ever.

10. Exfiltration Confirmed in 27% of Cases

Data exfiltration was confirmed inΒ 27%Β of all cases, with signs of staging or possible exfiltration in anotherΒ 9%. Among ransomware victims,Β 43%Β had confirmed data theft.

Remote ransomware attacks β€” where encryption occursΒ off-siteΒ via network connections β€” also surgedΒ 141%Β since 2022. These attacks often evade detection, as no malware is dropped locally.

11. The Ransomware Landscape Is Fragmenting

After the takedown of LockBit, no single group dominated the field in 2024. Still,Β Akira,Β Fog, andΒ LockBit remnantswere among the most observed.

This fragmentation makes attribution harder and reinforces the need for broad defenses rather than threat actor–specific strategies.

12. Sophos’ Recommendations: How to Defend Effectively

To build a more resilient defense posture, Sophos urges organizations to:

  • Close exposed RDP ports
  • Use phishing-resistant MFA
  • Patch all internet-facing systems promptly
  • Deploy 24/7 MDR or EDR solutions
  • Develop and rehearse incident response plans

Conclusion: Proactive Security Is the Only Way Forward

The 2025 Sophos Active Adversary Report makes one thing clear β€”Β passive security is no longer an option. Attacks are faster, more sophisticated, and increasingly use tools that mimic legitimate system behavior.

Organizations mustΒ embrace real-time monitoring, swift response capabilities, and eliminate internal roadblocks to patching and configuration changes. Otherwise, they risk learning hard lessons β€” as some unfortunate case studies show β€” too late.

With valid credentials now the most common weapon, and data exfiltration happening within days, the question isn’tΒ if you’ll be targeted, but whether you’re ready to respond in time.

The Analyst

The Analyst delivers in-depth, data-driven insights on technology, industry trends, and digital innovation, breaking down complex topics for a clearer understanding. Reach out: Mail@Tech-ish.com

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Back to top button