Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
Huntress glitch effect
HomeNews & Press
Hackers Ramp Up Efficiency, Speed, and Scale in 2024, Targeting Business of All Sizes

Hackers Ramp Up Efficiency, Speed, and Scale in 2024, Targeting Business of All Sizes

February 11, 2025
Huntress glitch effect
Share icon
Glitch effect
Glitch banner

12-month analysis led by Huntress’ industry-defining security team reveals ransomware groups maximizing profits with quick, widespread attacks

‍Columbia, MD – February 11, 2025 – Hackers are getting faster, craftier, and harder to spot. Today, Huntress, the cybersecurity company purpose-built to protect businesses of all sizes, exposes their playbook with the Huntress 2025 Cyber Threat Report, an extensive analysis of hacker activity that draws insights from over three million endpoints across thousands of organizations. The report reveals how threat actors adapted their tradecraft throughout 2024, using sophisticated tools and techniques across industries to maximize efficiency and profits.

In 2024, the gap between attack sophistication on large and smaller businesses nearly disappeared. Hackers took the methods and strategies tested on larger companies and applied them to organizations of every size. Advanced evasion techniques—once exclusive to advanced persistent threats—became the new normal, including endpoint detection and response (EDR) tampering, bring your own vulnerable driver (BYOVD) privilege escalations, and User Account Control (UAC) bypasses.

The takedown of major ransomware groups like LockBit and Dharma didn’t slow down attacks either—it opened the door for smaller, more agile groups and rebranded operations. Among them, Lynx—which shares many similarities with and is widely believed to be a rebranding of INC ransomware—RansomHub, a sub-group of LockBit, and Akira all ramped up their activity significantly compared to 2023.

Over the past year, Huntress tracked ransomware incidents from Lynx, Akira, and RansomHub, with incidents from these groups increasing by 7.9%, 11.6%, and 15.3%, respectively. By giving affiliates higher percentage payouts, often reaching 80–90% of the ransom, and pursuing a quantity-over-quality approach, the three collectively accounted for 54% of all ransomware incidents observed by Huntress in 2024. These groups used 'smash-and-grab' tactics, quickly deploying ransomware, demanding payment, and hitting their goals with swift and efficient network infiltration to minimize dwell time and evade detection. While the average time-to-ransom (TTR)—the time from initial access to ransomware deployment—was shy of 17 hours, Akira and RansomHub’s came in around six hours, with Lynx not far behind at seven hours.

“Ransomware-as-a-Service (RaaS) groups like Lynx, Akira, and RansomHub have industrialized cybercrime, adopting a 'quantity over quality' approach to maximize profits. By providing affiliates with streamlined playbooks and toolkits, they've made launching attacks deceptively simple and incredibly lucrative,” said Greg Linares, Principal Threat Intelligence Analyst. “The rise of RaaS groups such as these has led to increased attacks on businesses of all sizes with sophisticated techniques, once reserved for attacks on large enterprises, now becoming commonplace.”

‍Key trends in the Huntress 2025 Cyber Threat Report include:

  • Education, healthcare, and technology industries were top targets: Education was the most targeted industry by hackers in 2024, making up 21% of all attacks, followed by healthcare (17%) and technology (12%). Hackers used tactics like credential theft, abuse of remote monitoring and management (RMM) tools, and malicious updates disguised as legitimate software to infiltrate educational institutions. Education is often seen as an easy target due to a reliance on shared networks, outdated systems, and lower security budgets, combined with the wealth of sensitive data, like student records and research, that makes these institutions top targets. Beyond that, the potential to disrupt learning processes and administrative functions also puts schools and universities under intense pressure to resolve attacks quickly, often forcing them into ransom payments. 
  • Infostealers drove initial access and ransomware attacks: Infostealers accounted for nearly a quarter (24%) of all observed incidents, highlighting their role in harvesting credentials, financial data, and sensitive information. Even adware and other unwanted programs, once seen as harmless infections, now have infostealing features that take sensitive data, contributing to a rise in infostealer incidents. Threat actors like Initial Access Brokers (IABs) regularly use infostealers to sell access to businesses, grouping them based on what gets stolen and increasing prices based on the freshness of the data, type of data (like session tokens), and target. Some IABs cherry-pick high-value data to sell to ransomware groups, earning percentages of ransom payments as a finder's fee. 
  • Hackers maximized efficiency with automation: The majority (87%) of attacks in 2024 were automated or helped by automated tools, with hackers using malware, scripts, and other automated methods to conduct widespread, low-effort campaigns efficiently. Once attackers got access, they moved to more focused hands-on-keyboard (HOK) activity, representing 13% of activity, where manual actions like lateral movement or domain enumeration were executed. HOK activity spiked in February, June, July, and November 2024, with activity most common between 12:00 UTC and 20:00 UTC—aligning with US East Coast business hours. This timing suggests attackers exploit normal business activity as a cover or need active devices and personnel for social engineering tactics.
  • Phishing attacks grew more sophisticated: Phishing is still a key tool for initial access and reconnaissance, with attackers moving towards more sophisticated tactics like QR code phishing and Living Off Trusted Sites (LoTS). QR code phishing—where users are sent an email with a QR embedded that directs to a malicious site—accounted for 8.1% of phishing emails, while 7% involved LoTS, a tactic that abuses legitimate platforms to share malicious documents. These advanced techniques mark a shift toward more targeted and deceptive strategies designed to exploit trust and evade traditional email filters.

“Hacker tradecraft is evolving fast, with ransomware groups growing bolder, attacks becoming harder to detect, and phishing scams reaching new levels of sophistication,” added Jamie Levy, Director, Adversary Tactics. “To stay ahead, organizations need a well-rehearsed incident response plan, ongoing vulnerability assessments, timely patching, and security awareness training that actually sticks. Key controls like endpoint detection and response, network segmentation, and identity and access management are also critical to minimizing risk. With ransomware deployed within hours of initial access, taking proactive steps now is essential to minimizing the impact of a breach.”

‍Additional resources:

  • Get your copy of the Huntress 2025 Cyber Threat Report for insights on ransomware strategies, hacker activity, common tools and techniques, and more.
  • Register for the webinar, “Breaking Down The Huntress 2025 Threat Report” on March 3, 2025, for insights from our experts on the latest cyber trends, shady tactics, and tradecraft we exposed in the Huntress 2025 Cyber Threat Report.
  • Learn how Huntress protects endpoints, identities, and more with managed detection, investigation, and response.
  • Read the Huntress Blog to stay updated on the latest tradecraft and tips to protect your business. 

About Huntress

Huntress is a global cybersecurity company on a mission to make enterprise-grade products accessible to all businesses. Purpose-built from the ground up, the Huntress Agentic Security Platform unleashes end‑to‑end protection in the age of AI. From Endpoint Detection and Response (EDR) and Identity Threat Detection and Response (ITDR) to Security Information and Event Management (SIEM), Security Awareness Training (SAT), and Security Posture Management, the Huntress Agentic Security Platform is targeted protection for endpoints, identities, data, and employees, delivering trusted outcomes and valuable peace of mind.

Its 24/7 AI-centric Security Operations Center (SOC) is powered by a team of world-renowned engineers, researchers, and security analysts dedicated to stopping cyber threats before they cause harm. Huntress is often the first to respond to major hacks and incidents, with its expert security team sharing real-time tradecraft analysis and actionable advisories with the community.

Currently safeguarding more than 4 million endpoints and 10 million identities, Huntress empowers internal security and IT teams and Managed Service Providers (MSPs) worldwide to protect their businesses with enterprise-grade, accessible security products.

As long as hackers keep hacking, Huntress keeps hunting. Learn more at www.huntress.com, and follow Huntress on X, Instagram, Facebook, and LinkedIn.

‍Contact:

press@huntresslabs.com

+1 (650) 400-7833

See Huntress in action

Our platform combines a suite of powerful managed detection and response tools for endpoints and Microsoft 365 identities, science-backed security awareness training, and the expertise of our 24/7 Security Operations Center (SOC).
Book a Demo
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy