83% of Ransomware Attacks Now Hit Active Directory, Exposing EDR Blind Spots
Semperis data shows identity infrastructure—not endpoints—is the primary ransomware target, while BYOVD attacks blind traditional EDR, forcing enterprises to rethink defense budgets.
Identity Systems Replace Endpoints as Primary Attack Surface
Active Directory and Entra ID compromises now account for 83% of successful ransomware attacks, according to Semperis' 2025 Ransomware Risk Report analyzing 2024-2025 incidents. The finding exposes a structural gap in enterprise defenses: most organizations deploy endpoint detection and response tools that monitor workstations and servers while leaving identity infrastructure—the systems controlling access to those assets—unmonitored and unrecoverable.
The consequence is measured in outage duration, not breach detection. When attackers compromise AD, they control authentication across the network. Recovery requires rebuilding identity infrastructure before any other system can restart. Semperis reports that enterprises lacking AD-specific backup and recovery capabilities face recovery time objectives exceeding 24 hours, translating to multi-million dollar losses in sectors like healthcare where March 2026 attacks forced prolonged system shutdowns.
This shifts the ransomware problem from a detection challenge to a recovery engineering problem. The 83% compromise rate persists despite widespread EDR deployment, indicating attackers have already bypassed endpoint controls by the time they reach identity systems. The data pressures CISOs to allocate budget not to better detection of the initial intrusion, but to faster recovery of the authentication layer that gates every other recovery step.
BYOVD Attacks Render Endpoint Tools Blind During Critical Hours
Bitdefender analysis of December 2025 through February 2026 US ransomware campaigns identifies Bring Your Own Vulnerable Driver tactics as the dominant method for disabling EDR during active attacks. Ransomware-as-a-Service platforms now market BYOVD tooling as a standard feature, automating what were previously manual evasion techniques. The result is a window of hours to days where endpoint security operates blind while attackers move laterally and compromise identity infrastructure.
The timing matters for procurement decisions. EDR tools costing enterprises $5-10 million annually now require hardening against kernel-level evasion or supplementation with privileged access management and zero-trust network access layers. Vendors like Mamori.io position PAM integration—combining privileged access controls, two-factor authentication, and database activity monitoring—as the evasion-resistant alternative to EDR-only stacks. Pricing details remain vendor-specific, but the pitch centers on cost fractions compared to traditional PAM suites that enterprises previously deemed too expensive to deploy broadly.
The competitive pressure falls on pure-play EDR vendors. CrowdStrike, SentinelOne, and Microsoft Defender now face RFPs demanding post-BYOVD recovery service-level agreements and demonstrated resistance to kernel exploits. Buyers increasingly require proof that detection survives driver-level attacks, or they shift budget to managed detection and response services providing 24/7 monitoring that assumes endpoint tools will fail during sophisticated attacks.
Budget Reallocation Favors Identity Recovery Over Endpoint Prevention
The Semperis findings drive a specific procurement pattern: CISOs under board scrutiny for identity resilience now evaluate vendors on recovery time objectives under four hours rather than mean time to detect. Semperis' Purple Knight tool scans AD and Entra ID for indicators of exposure and compromise, generating board-reportable benchmarks that quantify risk before an attack. The company's Ready1 platform orchestrates out-of-band recovery, isolating identity infrastructure restoration from compromised production networks.
This creates differentiation against general-purpose security vendors. Where Microsoft Defender or TeamT5's integrated services focus on blocking attacks at endpoints, Semperis argues the 83% AD compromise rate proves blocking fails frequently enough that recovery speed determines business impact. The pitch resonates in healthcare, financial services, and critical infrastructure where downtime costs exceed six figures per hour.
TeamT5's 2026 Enterprise Cybersecurity Guide still mandates EDR as the top ransomware control, prioritizing timely blocking and patching. The guidance reflects vendor positioning for bundled detection-response stacks in a market approaching $10 billion globally. Buyers now structure proof-of-concept tests requiring ransomware block rates above 95%, reallocating budget from legacy antivirus to platforms demonstrating efficacy against AI-driven attack automation.
What to Watch: Recovery SLAs Replace Detection Metrics in Vendor Evaluations
The shift from prevention to recovery metrics will reshape security vendor competition through 2026. Expect RFPs to demand documented recovery time objectives for identity infrastructure, with financial penalties for exceeding four-hour windows. Vendors unable to demonstrate AD-specific recovery capabilities will lose deals to specialists like Semperis, even if their endpoint detection rates exceed competitors.
Watch for EDR vendors to acquire or partner with identity security companies rather than build recovery capabilities internally. The 83% compromise rate suggests endpoint security remains necessary but insufficient—a commoditizing signal that pushes vendors toward platform consolidation. Enterprises should pressure vendors for transparent recovery testing results and third-party validation of BYOVD resistance before renewing contracts predicated on detection alone.
Technology decisions, clearly explained.
Weekly analysis of the tools, platforms, and strategies that matter to B2B technology buyers. No fluff, no vendor spin.
