The Intrusion Starts Weeks Before the Alert: What Security Teams Miss Until It’s Too Late
January 24, 2026

Introduction
Most security teams don’t lose because they are careless.
They lose because they are late.
Not late in response time. Not late in escalation. Not late in patching the “critical” CVE the scanner screamed about.
Late in seeing the attack at all.
Because by the time your SIEM lights up, your EDR throws an alert, or a user reports something suspicious, the intrusion is rarely “starting”. It is surfacing. And that distinction matters more than most organisations realise.
Modern attacks do not begin with ransomware. They begin with quiet preparation. They begin with reconnaissance, credential testing, infrastructure setup, phishing rehearsals, and small, low-risk probes designed to validate access paths. These steps happen days or weeks before the first visible sign of compromise. Sometimes months.
This is the uncomfortable truth: the breach is often already in progress before
you even know you’re in a game.
In this blog, we will break down what attackers do long before “the incident”, why security teams miss it, and how intelligence-led detection, threat hunting, and Managed Detection and Response (MDR) can close the gap between “first access” and “first alert”.
Because in 2026, the real question is not “how fast can we respond?”
It is “how early can we detect?”
The myth of the “incident start time”
Most organisations still think in incident timelines like this:
1. Attacker breaks in
2. Attacker deploys malware
3. Alerts trigger
4. Security team responds
5. Recovery begins
That is a neat story. It is also not how real compromises unfold.
In reality, the incident timeline looks more like this:
1. Attacker identifies your organisation as a target
2. Attacker maps your exposed footprint
3. Attacker tests credentials and weak authentication paths
4. Attacker sets up infrastructure and delivery methods
5. Attacker gains a foothold (often quietly)
6. Attacker validates access, escalates privileges, and moves laterally
7. Attacker exfiltrates data, disables controls, and prepares the payload
8. The organisation finally sees an alert
9. The business experiences the impact
The “incident” is not the ransomware note.
The “incident” is not the encryption event.
The “incident” is not the headline.
The incident is the entire chain of attacker activity that leads to business disruption.
And if you are only detecting at step 8, you are not defending. You are cleaning up.
Why attackers stage quietly (and why it works)
Attackers stage quietly because it is efficient. It reduces risk. It increases success.
Think about it from the adversary’s perspective. If you are a ransomware operator, an affiliate, or an access broker, you do not want to smash and grab on day one. You want to:
- Avoid triggering detection
- Confirm the value of the target
- Establish persistence
- Identify privileged accounts
- Locate backups and recovery mechanisms
- Find the fastest route to domain-wide control
- Time the disruption for maximum impact
The best attackers behave like patient burglars, not reckless vandals.
They don’t kick the door down. They test the locks.
They don’t run through the hallway. They study the floor plan.
They don’t grab the first thing they see. They locate the safe.
And most security programmes are built to detect the kick, not the lock testing.
The intrusion lifecycle: what happens before you see anything
To understand what security teams miss, you need to understand what attackers do before the moment you call it an incident.
Phase 1: Reconnaissance (your organisation is mapped before you are attacked)
The first stage is visibility.
Attackers want to know:
• What domains you own
• What subdomains exist (including forgotten ones)
• What services are exposed
• What cloud platforms you use
• What remote access solutions you rely on
• What third parties are connected
• Who your employees are
• What your technology stack looks like
This reconnaissance happens passively and actively.
Passive recon is quiet. It involves scraping public sources: DNS records, certificate transparency logs, leaked credential dumps, company websites, LinkedIn, GitHub, vendor portals, and old documents containing metadata.
Active recon is louder, but still subtle. It includes scanning and probing your perimeter for exposed services, misconfigurations, and authentication endpoints.
The key point is this: by the time the attacker touches your network, they have already built a working model of your environment.
Security teams often miss this phase because it does not happen “inside” the network, so it does not show up in endpoint telemetry or internal logs.
But the intrusion has already started.
Phase 2: Credential testing (the most common “first access” is not a vulnerability)
Many organisations still treat patching as the centre of gravity for cyber defence. Patch management matters. But it is no longer the primary driver of compromise in many real-world attacks.
Attackers increasingly break in through identity compromise.
That includes:
• Stolen credentials from infostealer malware
• Password reuse across personal and corporate accounts
• MFA fatigue attacks (push bombing)
• Session token theft
• OAuth consent abuse
• Legacy authentication paths that bypass modern controls
• Compromised third-party accounts
• Insider misuse (malicious or accidental)
Credential testing is often automated. Attackers will test usernames and passwords against VPN portals, O365, Citrix, RDP gateways, SSH endpoints, and web apps.
They do not need to “hack” your firewall if they can log in like a user.
And because these attempts often look like normal authentication traffic, they
blend in.
If you are not actively monitoring for unusual login patterns, impossible travel, risky sign-ins, suspicious device fingerprints, and repeated authentication failures, you may never notice.
Phase 3: Infrastructure setup (the attack is built before it is delivered)
Before an attacker launches a phishing campaign or drops malware, they build the machinery required to do it at scale.
This includes:
• Registering lookalike domains
• Spinning up VPS infrastructure
• Setting up command-and-control servers
• Creating phishing kits
• Hosting payloads on compromised sites
• Building redirect chains
• Acquiring valid TLS certificates to appear legitimate
• Testing email deliverability and evasion
This stage is especially important because it is where the attacker becomes detectable outside your environment.
The problem is that most security teams are not watching the external threat landscape closely enough. They are focused inward. They are waiting for the attacker to arrive.
But attackers do not just appear. They assemble.
This is exactly why threat intelligence is not a “nice-to-have”. It is the early warning system that tells you an intrusion is forming before it lands.
At Cybergen, we focus on threat intelligence because it gives organisations the ability to see what is being built against them, not just what has already hit them.
You can learn more about our approach
here.
Phase 4: Initial access (the foothold is often small, quiet, and easy to dismiss)
Initial access is rarely dramatic.
It might be:
- A successful login to a VPN portal
- A compromised mailbox accessed via a valid session
- A single endpoint infected with an infostealer
- A misconfigured web app that allows a file upload
- A forgotten admin interface exposed to the internet
- A third-party vendor account used to pivot in
The attacker does not immediately deploy ransomware. They do not want to trigger alarms. They want to confirm their access and expand it.
In many cases, initial access looks like nothing more than “a user logging in”.
This is where the gap between “alerts” and “attacker behaviour” becomes dangerous.
Security tools that are tuned only for malware detection will miss identity-based intrusions entirely.

Phase 5: Discovery and privilege escalation (where the real compromise begins)
Once inside, attackers do what all competent adversaries do: they explore.
They enumerate:
• Users and groups
• Active Directory structure
• Privileged accounts
• Domain controllers
• File shares
• Backup systems
• Security tooling
• Remote management platforms
• Cloud identity and permissions
• Business-critical applications
They hunt for keys to the kingdom.
Privilege escalation might involve:
• Token impersonation
• Kerberoasting
• Password spraying internally
• Exploiting misconfigured permissions
• Dumping credentials from memory
• Abusing local admin rights
• Finding credentials stored in scripts or documentation
• Exploiting weak service accounts
This is where many security teams get caught out, because the activity is often “normal” administrative behaviour.
PowerShell is used by IT teams every day.
Remote admin tools are legitimate.
Credential access techniques can be subtle.
The difference is intent. And intent is hard to detect without context.
That is why threat hunting and intelligence-led detection matter. You need to understand what malicious behaviour looks like in your environment, not just what “malware” looks like in a lab.
Phase 6: Lateral movement (the silent spread)
The goal of lateral movement is simple: reach systems that matter.
Attackers move across:
• Workstations
• Servers
• Virtual environments
• Cloud workloads
• Email tenants
• Backup repositories
• OT and industrial networks (where applicable)
They often use built-in tools and legitimate credentials.
This is not Hollywood hacking. This is operational efficiency.
If your environment lacks segmentation, strong identity controls, and visibility across endpoints, servers, and cloud, lateral movement can happen quickly and quietly.
And once an attacker reaches privileged systems, the outcome becomes predictable.
Phase 7: Data theft and staging (the leverage is collected before disruption)
Most ransomware attacks are now double or triple extortion.
That means encryption is only one part of the playbook. Data theft is the leverage.
Attackers steal:
• HR data
• Customer records
• Financial documents
• Legal contracts
• Intellectual property
• Credentials and secrets
• Operational plans
• Sensitive emails and internal communications
They stage the data somewhere accessible, then prepare the final disruption.
Security teams often miss this stage because:
• Exfiltration can be slow and throttled
• Data can be compressed and encrypted
• Traffic may go to legitimate cloud services
• Monitoring may not be tuned for outbound anomalies
• DLP may be absent or poorly implemented
If you only detect ransomware at encryption time, you have already lost control of your data.
A realistic example: “The alert was the end, not the beginning”
Let’s walk through a scenario that mirrors what we see across many incidents.
Day -21: The attacker identifies the target
An attacker searches for organisations in a specific sector, using public information and breach intelligence. They choose a target with high operational impact potential and a reasonable chance of payment.
Day -19: External recon begins
They map domains and subdomains. They identify an exposed remote access portal and a third-party vendor login page.
Day -17: Credential testing starts
They test a batch of stolen credentials from an infostealer log. One set works.
No malware. No exploit. Just a login.
The login comes from a residential IP and looks “human”. It happens outside business hours, but the organisation has no alerting for unusual access patterns.
Day -16: Mailbox access and internal reconnaissance
The attacker accesses email, reviews conversations, learns the company structure, and identifies an IT administrator.
They create mailbox rules to hide future security notifications.
Day -14: Persistence is established
They register a new MFA method using social engineering and session hijacking techniques.
The account now has resilience. Even if the password changes, the attacker can regain access.
Day -12: Internal movement begins
They access SharePoint and OneDrive, searching for “passwords”, “VPN”, “backup”, “admin”, and “finance”.
They find credentials stored in a spreadsheet.
Day -10: Privilege escalation
Using the discovered credentials, they access a privileged account. They begin enumerating Active Directory.
Day -8: Security controls are mapped
They identify the EDR vendor, the SIEM, and the backup platform.
They start disabling or bypassing controls where possible, using administrative tools.
Day -6: Data is exfiltrated
Data is compressed and slowly exfiltrated to a cloud storage provider.

Outbound traffic is not flagged because it is encrypted and the organisation has limited egress monitoring.
Day -1: Ransomware staging
Payloads are placed across multiple systems. The attacker waits for the weekend.
Day 0: Encryption and disruption
Systems are encrypted. The business is down.
The first meaningful alert happens on Day 0.
From the organisation’s perspective, the “attack started today”.
In reality, the intrusion started three weeks ago.
This is not an edge case. This is normal.
Why security teams miss the early stages
It is not because they are incompetent. It is because the industry has trained them to focus on the wrong signals.
1) Too much reliance on vulnerability scanning
Vulnerability scans are useful. But they measure known weaknesses, not attacker intent.
They can tell you what is missing a patch.
They cannot tell you what an attacker is actively exploiting in your sector.
They cannot tell you which exposed service is being targeted right now.
They cannot tell you whether stolen credentials are being used against you today.
Scanning is not threat intelligence. It is a hygiene tool.
2) Alert fatigue and signal overload
Security teams are drowning in alerts.
When everything is critical, nothing is.
Attackers exploit this by operating below the threshold of “worth investigating”.
They keep activity low-volume. They mimic normal behaviour. They move slowly.
3) Lack of identity-centric monitoring
Most organisations still treat identity as an IT function rather than a security battleground.
But identity is now the primary access vector.
If you are not monitoring:
• Risky sign-ins
• Conditional access failures
• MFA enrolment changes
• OAuth app consent events
• Impossible travel patterns
• Device posture anomalies
You are blind to modern intrusions.
4) Limited visibility across cloud, endpoints, and network
Many security stacks are fragmented.
You might have endpoint logs, but not cloud telemetry.
You might have firewall logs, but not identity context.
You might have email security, but no correlation into user behaviour.
Attackers thrive in the gaps.
5) No dedicated threat hunting
Threat hunting is not the same as incident response.
Incident response is reactive.
Threat hunting is proactive.
If you only investigate when an alert fires, you are letting attackers set the pace.
What “early detection” really looks like in 2026
Early detection is not a single tool. It is a capability.
It means detecting:
• Reconnaissance against your perimeter
• Suspicious authentication attempts and anomalous logins
• Use of valid credentials from unexpected locations
• Rare administrative commands and execution patterns
• Lateral movement behaviour
• Abnormal data access and outbound transfers
• Infrastructure indicators linked to active threat campaigns
Early detection is about understanding attacker behaviour as a chain, not as isolated events.
A single failed login attempt is nothing.
A pattern of failures followed by a successful login from a new location is something.
That login followed by mailbox rule creation is more.
That followed by SharePoint mass downloads is serious.
That followed by privilege escalation attempts is a crisis.
This is what intelligence-led detection does. It turns scattered noise into a story.
The hard truth: you can’t defend what you can’t see
Most organisations do not have a technology problem.
They have a visibility and timing problem.
Attackers are not beating you because they are smarter.
They are beating you because they are earlier.
They are earlier in reconnaissance.
Earlier in credential compromise.
Earlier in infrastructure setup.
Earlier in foothold establishment.
Earlier in privilege escalation.
Earlier in data theft.
And your first alert is often the final act.
If you want to change the outcome, you need to shift your mindset from “incident response” to “intrusion detection”.
You need to detect the intrusion while it is still forming, not after it has already matured into impact.
That is what intelligence-led security delivers.
And that is how you stop being surprised by incidents that have been quietly unfolding for weeks.
Ready to strengthen your security posture? Contact us today for more information on protecting your business.
Let's get protecting your business
Thank you for contacting us.
We will get back to you as soon as possible.
By submitting this form, you acknowledge that the information you provide will be processed in accordance with our Privacy Policy.
Please try again later.
Cybergen News
Sign up to get industry insights, trends, and more in your inbox.
Contact Us
Thank you for subscribing. It's great to have you in our community.
Please try again later.
SHARE THIS
Latest Posts









