← Back to The Signal THREAT RESEARCH

Ransomware Has Gone Autonomous — Has Your Response?

Apr 4, 2026 · 9 min read

In 2019, ransomware was a cottage industry. A human operator would gain access to a network — usually through a phishing email or an exposed RDP port — and then spend days, sometimes weeks, carefully mapping the environment, identifying critical systems, disabling backups, and positioning their payload. The encryption event was the final step of a long, manual process.

Those days are over.

The ransomware strains dominating 2025 and 2026 operate on a fundamentally different model. They don't need a human operator guiding them through the network. They enumerate, escalate, exfiltrate, and encrypt — autonomously, in minutes.

The evolution of autonomous malware

The shift happened gradually, then all at once. Each generation of ransomware inherited the lessons of the last:

2020-2021: The playbook era. Groups like Conti and REvil formalized the attack chain. They created detailed internal playbooks — step-by-step instructions for "affiliates" to follow after gaining initial access. The attack was still manual, but it was systematized.

2022-2023: The toolkit era. Groups began bundling automated discovery and lateral movement tools with their ransomware. CobaltStrike, Mimikatz, and custom scripts did the heavy lifting. The human operator became more of a supervisor than a hands-on attacker.

2024-2025: The agent era. The latest ransomware families — tracked under names like BlackSerpent, NovaCrypt, and Phantom Mantis — embed intelligent agents that make real-time decisions based on the environment they encounter. They adapt their behavior to avoid detection, choose different escalation paths based on the security tools they discover, and prioritize data exfiltration targets based on file naming patterns and directory structures.

Anatomy of a 9-minute ransomware attack

In February 2026, Palo Alto's Unit 42 published a detailed analysis of a BlackSerpent intrusion at a healthcare provider. The timeline was staggering:

0:00 — Initial access via a compromised VPN credential (purchased on dark web marketplace).

0:22 — Automated network discovery. The agent identified 340 endpoints, 12 servers, and 3 domain controllers.

1:15 — Privilege escalation via a Kerberoasting attack against a service account with domain admin privileges.

2:40 — Backup systems identified and disabled. Shadow copies deleted.

3:30 — Data staging began. The agent identified and packaged 280GB of patient records, financial data, and proprietary research.

5:15 — Exfiltration to a cloud storage endpoint over encrypted HTTPS. No data was sent to a known-bad IP — the exfiltration endpoint was a freshly provisioned legitimate cloud server.

8:45 — Encryption began across all accessible endpoints simultaneously.

9:02 — Ransom notes deployed. All 340 endpoints encrypted.

Nine minutes. From credential to catastrophe.

"The traditional incident response model assumes there's time to contain. When an attacker can execute a full kill chain in under ten minutes, containment requires a response that's measured in seconds, not hours." — Unit 42, 2026 Ransomware Retrospective

Why your current defenses weren't built for this

Most enterprise security architectures were designed for the 2019-era threat model. They assume the attack unfolds over hours or days. They assume there's time for an analyst to investigate, for a manager to approve containment, for the IR plan to be invoked.

Against a nine-minute attack, those assumptions collapse. The SIEM fires alerts at 0:22. The analyst picks up the first alert at minute 4. By the time they've determined it's not a false positive, the encryption has already started.

This isn't a detection failure. Every major EDR platform would detect the individual steps of this attack chain. The failure is in the space between detection and response — the human investigation bottleneck.

Autonomous attacks require autonomous defense

There's a symmetry to modern cybersecurity that the industry has been slow to acknowledge: autonomous attacks require autonomous defense. You can't fight a nine-minute fully automated attack with a 45-minute human investigation process.

n0limit was built for exactly this scenario. When the BlackSerpent agent begins its network discovery at second 22, n0limit has already investigated the anomalous VPN login, correlated it with the credential's risk profile, and identified it as a compromised account. By second 23, the investigation is complete and the recommended containment action — disable the account, isolate the endpoint — is on the analyst's screen.

The analyst doesn't need to investigate. They need to approve. One click, and the attack chain breaks at step one.

That's the difference between a nine-minute catastrophe and a one-second non-event.

Ransomware has evolved beyond what manual investigation can handle. The question isn't whether your organization will face an autonomous attack. It's whether your response will be autonomous enough to stop it.

Don't bring a human to a machine fight.

See how n0limit stops autonomous attacks before they reach encryption.

Book a demo →