There’s no way to predict exactly what hackers will do before a ransomware attack, but interrupting them early in the Time-to-Ransom (TTR) window is a proven security strategy. TTR is the time attackers need to move from initial access to unloading ransomware on a vulnerable system. According to the 2025 Cyber Threat Report, ransomware groups like INC and Akira only need six to eight hours of TTR. This isn’t long at all, which drives home the importance of prevention in the early stages of ransomware.
Let’s break down the key stages here so you know how to detect the early stages of a ransomware attack.
Figure 5: Steps taken from targeting victims to deploying the payload
Step 1: Targeting victims
This is also known as the “reconnaissance phase” of a ransomware attack. Attackers are looking for their next vulnerable target worth their effort. This step is important because it sets up the following stages leading up to ransomware deployment.
Step 2: Gaining initial access
Now that the target has been identified, attackers work fast to gain access and find sensitive data to encrypt. Here are two ways we see attackers do this:
Figure 6: Distribution of initial access vectors from Huntress’ Tactical Response Team. Source.
Step 3: Maintaining access
Attackers aren’t naïve. They know their access can disappear anytime—a password gets reset or a software update kicks them out. They move slowly and methodically to avoid detection while setting up a backup plan to maintain persistent access to the target environment.
The unsettling thing here is that they often use legit tools to blend into network traffic, making detection tricky. They do everything possible to fly under the radar while moving closer to launching the ransomware payload.
Step 4: Deploying the payload
This is where ransomware starts spreading like wildfire across the network. Attackers will lock up anything that’ll get them the biggest bang for their buck—data servers, local email systems, domain controllers, and more. Similar to earlier stages, attackers might use malicious tools or hijack legit software to compromise their targets.
Figure 7: Example of Huntress flagging ransomware attacker tradecraft
Figure 8: Example of an Akira ransom note. Source.