Ransomware attacks most likely to strike after-hours
Researchers identify patterns of commonality, including attack vector, dwell time and the time of strike
 
 
Three-quarters of ransomware attacks are launched during the weekend or after work on a weekday, as attackers aim to maximise the potential for devastation and slow down any attempts at mitigation.
Just under half of all ransomware attacks, 49%, are launched on weekdays after 6pm while just 24% occur during work hours and 27% on weekends, according to findings by Fire Eye.
RELATED RESOURCE
  
The essential guide to cloud-based backup and disaster recovery
Support business continuity by building a holistic emergency plan
The most common hour for ransomware attacks to strike organisations is 11pm, at a time where workers least likely to be able to respond instantaneously.
Organisations from various sectors have been struck with ransomware attacks on an increasing basis in recent months and years, with attacks on UK businesses soaring 195% in the first half of 2019, for example.
“Ransomware is a remote, digital shakedown. It is disruptive and expensive, and it affects all kinds of organizations, from cutting edge space technology firms, to the wool industry, to industrial environments,” said Fire Eye’s intelligent analysis manager Kelli Vanderlee.
“Infections have forced hospitals to turn away patients and law enforcement to drop cases against drug dealers.”
How to keep your files safe from ransomware The most popular ransomware strains targeting UK businesses Ransomware attacks on UK businesses soar 195% Travelex disruption caused by devastating ransomware attack
High profile examples include the devastating Travelex disruption, as well as institutions in several US states, including Louisiana, and towns in Florida, and other states.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
This breed of attack, according to an examination of dozens of incident response investigations between 2017 and 2019, share several common characteristics, including attack vector, dwell time, and time and day of deployment.
There were several initial infection vectors spotted across multiple incidents, with remote access and remote desktop protocol (RDP) the most frequently observed. Other methods include phishing with a link or attachment and drive-by-download.
Another observation was that attackers normally leave at least three days between the first sign of malicious activity and deploying ransomware. In 75% of cases, this period is three days until the payload is deployed.
Among the key findings was that few attacks are launched during work hours, relative to after-work hours and weekends.
“Some attackers possibly intentionally deploy ransomware after hours, on weekends, or during holidays, to maximize the potential effectiveness of the operation on the assumption that any remediation efforts will be implemented more slowly than they would be during normal work hours,” Vanderlee continued.
“In other cases, attackers linked ransomware deployment to user actions. For example, in 2019 incidents at retail and professional services firms, attackers created an Active Directory Group Policy Object to trigger ransomware execution based on user log on and log off.”
Organisations seeking to mitigate or prevent ransomware infections have been given an array of measures they can take, many of which are now deemed common sense such as implementing multi-factor authentication (MFA).
Fire Eye has also urged organisations to establish emergency plans to ensure after-hours coverage is available to respond within a set time period in case of an emergency. After-hours escalation plans should also include redundant means to contact stakeholders, and 24-hour emergency contact information for any relevant third-party vendors.

Keumars Afifi-Sabet is a writer and editor that specialises in public sector, cyber security, and cloud computing. He first joined ITPro as a staff writer in April 2018 and eventually became its Features Editor. Although a regular contributor to other tech sites in the past, these days you will find Keumars on LiveScience, where he runs its Technology section.
- 
 AI layoffs could spark a new wave of offshoring AI layoffs could spark a new wave of offshoringNews Analysts expect a wave of rehiring next year in the wake of AI layoffs. That may sound like good news for workers, but it'll probably involve offshoring or outsourcing. 
- 
 Hackers are using these malicious npm packages to target developers Windows, macOS, and Linux systems Hackers are using these malicious npm packages to target developers Windows, macOS, and Linux systemsNews Security experts have issued a warning to developers after ten malicious npm packages were found to deliver infostealer malware across Windows, Linux, and macOS systems. 
- 
 Volkswagen confirms security ‘incident’ amid ransomware breach claims Volkswagen confirms security ‘incident’ amid ransomware breach claimsNews Volkswagen has confirmed a security "incident" has occurred, but insists no IT systems have been compromised. 
- 
 The number of ransomware groups rockets as new, smaller players emerge The number of ransomware groups rockets as new, smaller players emergeNews The good news is that the number of victims remains steady 
- 
 Teens arrested over nursery chain Kido hack Teens arrested over nursery chain Kido hacknews The ransom attack caused widespread shock when the hackers published children's personal data 
- 
 NCA confirms arrest after airport cyber disruption NCA confirms arrest after airport cyber disruptionNews Disruption is easing across Europe following the ransomware incident 
- 
 Cyber professionals are losing sleep over late night attacks Cyber professionals are losing sleep over late night attacksNews Hackers are biding their time and launching attacks when businesses can’t respond 
- 
 Prolific ransomware operator added to Europe’s Most Wanted list as US dangles $10 million reward Prolific ransomware operator added to Europe’s Most Wanted list as US dangles $10 million rewardNews The US Department of Justice is offering a reward of up to $10 million for information leading to the arrest of Volodymyr Viktorovych Tymoshchuk, an alleged ransomware criminal. 
- 
 Jaguar Land Rover “did the right thing” shutting down systems to thwart cyber attack Jaguar Land Rover “did the right thing” shutting down systems to thwart cyber attackNews The attack on Jaguar Land Rover highlights the growing attractiveness of the automotive sector 
- 
 Ransomware attack on IT supplier disrupts hundreds of Swedish municipalities Ransomware attack on IT supplier disrupts hundreds of Swedish municipalitiesNews The attack on IT systems supplier Miljödata has impacted public sector services across the country