• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
IT Infrastructure, Network Security, News

How Fast Does Ransomware Encrypt Files?

Research from Splunk suggests some ransomware groups have an encryption speed of mere minutes, with LockBit being the fastest.

March 25, 2022 Zachary Comeau Leave a Comment

Andrey Popov/stock.adobe.com

For IT and cybersecurity professionals, ransomware has been the scourge of the earth over the last two years, as the cybercrime economy continues to grow and beat system administrators and network defense pros to the point of attack.

One reason for the difficulty in preventing and responding to ransomware attacks is the speed with which ransomware groups encrypt files and lock users out, with some ransomware families taking just a handful of minutes to encrypt nearly 100,000, according to new research released by IT management software company Splunk.

In a research blog and whitepaper, the San Francisco, Calif. firm analyzed 10 of the most popular ransomware variants and measured the speed at which the malware encrypted 53 GB of data, discovering that the average of the median to be just eight seconds shy of 43 minutes.

Further, all 10 of the most popular ransomware strains can encrypt the same amount of data in less than two hours, which highlights the importance of detection and response in the IT department’s software and competencies.

Splunk said its analysis came after the LockBit ransomware group posted a table on its Tor site listing ransomware encryption speeds for more than 30 ransomware variants, with LockBit 2.0 and LockBit making up the top two fastest to encrypt 100 GB at 4 minutes and 28 seconds and 6 minutes and 16 seconds, respectively.

“We couldn’t leave it to LockBit’s marketing team to only release content like this, so we rolled up our sleeves and got busy building an environment that would allow us to conduct our own ransomware speed tests,” Splunk said in a blog describing the project.

Using the Attack Range project created by Splunk researchers, the company created four victim profiles consisting of Windows 10 and Windows Server 2019 operating systems, each with two different performance specs benchmarked from customer environments. Ten samples each from 10 different ransomware families were chosen to be tested along with the Microsoft Defender detection identifiers from Virus Total.

Samples were tested across the four host profiles, amounting to 400 different ransomware runs. Using native Windows logging, Windows Perfmon statistics, Microsoft Sysmon, Zeek and stoQ, researchers measured the encryption speed of each variant.

Splunk’s analysis confirmed that the  LockBit ransomware is in fact the fastest strain, with a median encryption duration of five minutes and 50 seconds. However, LockBit also recorded the fastest sample, coming in at four minutes and nine seconds.

Babuk, meanwhile, was the second fastest, with a median duration of six minutes and 34 seconds, and also the only other variant analyzed with a median duration of under 10 minutes.

The research found that all of the 10 most popular ransomware variants have a median encryption duration of under two hours, and eight logged a median duration under one hour.

Since ransomware can encrypt files in the blink of an eye, Splunk suggests organizations start looking “left of boom,” and assess capabilities to prevent or detect the ransomware’s behavior.

The company also calls on IT admins and security professionals to adopt what are now baseline cybersecurity strategies, including multi-factor authentication, network segmentation, patching and centralized logging.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Cybersecurity, LockBit, ransomware, Splunk

Related Content:

  • Cloud, SASE, Aryaka How the Cloud is Redefining Media Production and…
  • Singlewire Software mass notification interview Singlewire Software on Mass Notification Solutions
  • URI catchbox 1 Catchbox Plus: The Mic Solution That Finally Gave…
  • Engaging virtual meeting with diverse participants discussing creative ideas in a bright office space during daylight hours Diversified Survey: Workplace AV Tech is Falling Short,…

Free downloadable guide you may like:

  • Practical Design Guide for Office SpacesPractical Design Guide for Office Spaces

    Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-face time with co-workers. When designing the office spaces — and meeting spaces in particular — enabling that connection between co-workers is crucial. But introducing the right collaboration technology in meeting spaces can […]

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.