Decoding the Ransomware Lifecycle: Detecting Early Signals in East-West Traffic
Back to top
January 20, 2026
Decoding the Ransomware Lifecycle: Detecting Early Signals in East-West Traffic
The Escalating Impact of Ransomware
Ransomware poses a massive threat to organizational stability. Data from our Global Threat Landscape Report shows that organizations contend with an average of 5-6 ransomware incidents each year. With costs often exceeding $3.6 million per incident and average downtime surpassing 37 hours, attacks drain budget, disrupting operations, eroding customer trust, and creating cascading effects across supply chains and critical services.
The widespread impact is particularly evident in high-value sectors like healthcare, where sensitive data makes organizations prime targets. Consider the 2025 Episource incident, which exposed the personal health information of 5.4 million people, including names, social security numbers, and insurance details.
Global supply chains face a comparable threat as exemplified by the Jaguar Land Rover ransomware attack where manufacturing production was halted for five weeks, creating a logistical bottleneck that rippled through the global dealership network for months.
In both cases, attackers employed "living-off-the-land" tactics by using legitimate native services like PowerShell and remote management tools. By blending into routine operations to move laterally, threat actors proved that it is now easier than ever to conduct an attack without being detected.
The Power of the Network to Uncover Ransomware
Ransomware campaigns in 2026 are expected to become increasingly targeted and strategic, focused on high-value, systemically fragile organizations, and timed to maximize financial impact.
To execute this strategy at scale, attackers are relying on a repeatable playbook, stealing credentials and living-off-the land to move laterally across the connected network and evading detection completely. Network visibility and telemetry provides the ground truth that traditional tools, like endpoints, can’t capture. By monitoring east-west network traffic, teams can uncover early indicators of compromise, such as Kerberoasting and anomalous reconnaissance – before a ransomware payload is deployed.
Learn about how ExtraHop detects complex threats, including ransomware, in the video below, and then explore our latest findings in the ExtraHop Global Threat Landscape Report.
Discover more

ExtraHop is on a mission to arm security teams to confront active threats and stop breaches. Our RevealX™ 360 platform, powered by cloud-scale AI, covertly decrypts and analyzes all cloud and network traffic in real time to eliminate blind spots and detect threats that other tools miss. Sophisticated machine learning models are applied to petabytes of telemetry collected continuously, helping ExtraHop customers to identify suspicious behavior and secure over 15 million IT assets, 2 million POS systems, and 50 million patient records.
Learn more at our about us page.
Share
Key Takeaways
- Ransomware is a persistent, costly reality. Organizations face an average of 5-6 incidents per year, with costs exceeding $3.6 million and 37+ hours of downtime each.
- High-value sectors like healthcare and manufacturing are prime targets, as shown by attacks that exposed 5.4 million patient records and halted auto production for five weeks.
- Attackers blend into normal operations using legitimate tools like PowerShell and remote management software — making them nearly impossible to catch with standard security tools.
- Ransomware campaigns in 2026 are expected to grow more targeted and strategically timed to maximize financial and operational damage against high-value, vulnerable organizations.
- Monitoring east-west network traffic reveals early warning signs of ransomware activity, like unusual reconnaissance and credential abuse, before any payload is ever deployed.





