12-month analysis led by Huntress’ industry-defining security team reveals ransomware groups maximizing profits with quick, widespread attacks
Columbia, MD – February 11, 2025 – Hackers are getting faster, craftier, and harder to spot. Today, Huntress, the cybersecurity company purpose-built to protect businesses of all sizes, exposes their playbook with the Huntress 2025 Cyber Threat Report, an extensive analysis of hacker activity that draws insights from over three million endpoints across thousands of organizations. The report reveals how threat actors adapted their tradecraft throughout 2024, using sophisticated tools and techniques across industries to maximize efficiency and profits.
In 2024, the gap between attack sophistication on large and smaller businesses nearly disappeared. Hackers took the methods and strategies tested on larger companies and applied them to organizations of every size. Advanced evasion techniques—once exclusive to advanced persistent threats—became the new normal, including endpoint detection and response (EDR) tampering, bring your own vulnerable driver (BYOVD) privilege escalations, and User Account Control (UAC) bypasses.
The takedown of major ransomware groups like LockBit and Dharma didn’t slow down attacks either—it opened the door for smaller, more agile groups and rebranded operations. Among them, Lynx—which shares many similarities with and is widely believed to be a rebranding of INC ransomware—RansomHub, a sub-group of LockBit, and Akira all ramped up their activity significantly compared to 2023.
Over the past year, Huntress tracked ransomware incidents from Lynx, Akira, and RansomHub, with incidents from these groups increasing by 7.9%, 11.6%, and 15.3%, respectively. By giving affiliates higher percentage payouts, often reaching 80–90% of the ransom, and pursuing a quantity-over-quality approach, the three collectively accounted for 54% of all ransomware incidents observed by Huntress in 2024. These groups used 'smash-and-grab' tactics, quickly deploying ransomware, demanding payment, and hitting their goals with swift and efficient network infiltration to minimize dwell time and evade detection. While the average time-to-ransom (TTR)—the time from initial access to ransomware deployment—was shy of 17 hours, Akira and RansomHub’s came in around six hours, with Lynx not far behind at seven hours.
“Ransomware-as-a-Service (RaaS) groups like Lynx, Akira, and RansomHub have industrialized cybercrime, adopting a 'quantity over quality' approach to maximize profits. By providing affiliates with streamlined playbooks and toolkits, they've made launching attacks deceptively simple and incredibly lucrative,” said Greg Linares, Principal Threat Intelligence Analyst. “The rise of RaaS groups such as these has led to increased attacks on businesses of all sizes with sophisticated techniques, once reserved for attacks on large enterprises, now becoming commonplace.”
Key trends in the Huntress 2025 Cyber Threat Report include:
“Hacker tradecraft is evolving fast, with ransomware groups growing bolder, attacks becoming harder to detect, and phishing scams reaching new levels of sophistication,” added Jamie Levy, Director, Adversary Tactics. “To stay ahead, organizations need a well-rehearsed incident response plan, ongoing vulnerability assessments, timely patching, and security awareness training that actually sticks. Key controls like endpoint detection and response, network segmentation, and identity and access management are also critical to minimizing risk. With ransomware deployed within hours of initial access, taking proactive steps now is essential to minimizing the impact of a breach.”
Additional resources:
About Huntress
Huntress is the enterprise-grade, people-powered cybersecurity solution for all businesses, not just the 1%. With fully owned technology developed by and for its industry-defining team of security analysts, engineers, and researchers, Huntress elevates underresourced tech teams whether they work within outsourced environments (OIS) or in-house IT and security teams (IIS).The 24/7 industry-leading Huntress Security Operations Center (SOC) covers cyber threats for OIS and IIS through remediation with a false-positive rate of less than 1%. With a mission to break down barriers to enterprise-level security and always give back more than it takes, Huntress is often the first to respond to major hacks and threats while protecting its partners, and shares tradecraft analysis and threat advisories with the community as they happen.As long as hackers keep hacking, Huntress keeps hunting. Join the hunt at www.huntress.com and follow us on X, Instagram, Facebook, and LinkedIn.
The fully managed security platform that combines endpoint detection and response, Microsoft 365 identity protection, a predictably affordable SIEM and science-based security awareness training. Powered by custom-built enterprise technology for mid-market enterprises, small businesses, and the MSPs that support them and delivered by unrivaled industry analysts in our 24/7 Security Operations Center.
Contact:
Valerie Baccei
+1 (650) 400-7833