After-Hours Cyber Threats Rise, Arctic Wolf 2025 Report Says

Published on September 18, 2025
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer

A significant acceleration in the threat landscape, with adversaries increasingly targeting organizations outside of standard business hours, was detailed in a comprehensive analysis of the evolving cyber threat landscape, drawing on more than 330 trillion security observations from over 10,000 organizations in 100+ countries.

Report Details

Arctic Wolf’s 2025 Security Operations Report findings highlight a pronounced acceleration in threat activity, with adversaries increasingly launching attacks outside traditional business hours—51% of security alerts now occur after hours, and nearly one-sixth (15%) of all alerts are generated on weekends. 

This trend reflects a deliberate strategy by threat actors to exploit reduced staffing, slower response times, and periods of lower vigilance.

Addressing this, Tim Bazalgette, Chief AI Officer at Darktrace, said, "With the shortage of skilled cyber professionals continuing to grow, organizations are increasingly turning to AI-powered tools to improve efficiency in the SOC. In fact, 88% of security professionals believe that the use of AI is vital to freeing up time for security teams to become more proactive, according to the 2025 State of AI Cybersecurity report."

51% of security alerts now occur after hours
51% of security alerts now occur after hours | Source: Arctic Wolf

Casey Ellis, Founder at Bugcrowd, said, "The proliferation of AI-powered vulnerability discovery tools, as well as the growth of AI-assisted code generation, means that a fresh, vulnerable attack surface is being created at an increasing rate, and the tooling to find and exploit this attack surface is doing so more effectively. All of this nets out to higher throughput into the SOC, which necessitates a shift in thinking around the economics of processing SOC alerts."

The report identifies several critical trends and statistics shaping enterprise security performance:

Campaigns such as those exploiting Fortinet FortiGate (Console Chaos) and SonicWall (CVE-2024-40766) vulnerabilities illustrated how intrusions could progress from initial access to broad privilege escalation and endpoint encryption in as little as 90 minutes.

Early detection is critical. Only 2% of the 9,000+ security investigations conducted during the report period were confirmed threats, highlighting the challenge of distinguishing malicious activity within massive volumes of operational telemetry.

Operational Recommendations and Conclusion

Addressing the challenges and offering advice, James Maude, Field CTO at BeyondTrust, said:

"Threat actors rarely work 9 to 5, so it is no surprise that 51% of alerts occur outside business hours and 15% happen on the weekend. In many cases, this is not simply a time zone difference but a deliberate ploy to strike when you are away from the keyboard. This is especially effective for identity-based attacks, as a user logging in on a weekend might not seem as suspicious an alert that malware is running.

One of the key reasons that users’ identities are easily exploited out of hours is that they have standing privileges and more often than not are overprivileged. When that is the case, if a threat actor is able to compromise an identity, they acquire 24/7 access with all the privileges the user has during the working day. This is why it is essential to reduce and ideally eliminate standing privileges using modern just-in-time approaches that only grant privilege when needed and take a zero-trust approach to validating the user’s identity.

Credentials are stolen, weaker forms of MFA can be bypassed, and helpdesks might even help a threat actor reset the credentials, so the best line of defense is to reduce the “blast radius” in the event of an identity compromise. Making sure that no matter what time of day or night it is exploited, the privileges, access, and risk are limited in scope.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: