Security Experts:

Connect with us

Hi, what are you looking for?


Malware & Threats

Analysis Shows How Fast Various Ransomware Strains Encrypt 100,000 Files

Cybersecurity researchers at Splunk have conducted an analysis to determine how long it takes various ransomware strains to encrypt files on compromised systems.

Cybersecurity researchers at Splunk have conducted an analysis to determine how long it takes various ransomware strains to encrypt files on compromised systems.

The analysis focused on ten major ransomware families and the goal was to encrypt nearly 100,000 files with a total size of approximately 54 Gb. The files were stored on four hosts — two running Windows 10 and two running Windows Server 2019. In addition to encryption speed and duration, the researchers also looked at how the ransomware used system resources.

They measured the encryption time for Avaddon, Babuk, BlackMatter, Conti, DarkSide, LockBit, Maze, Mespinoza (PYSA), REvil and Ryuk, with 10 samples analyzed for each malware family.

The researchers measured the time it took each sample to encrypt the 100,000 files and they used the median value to show the speed of each family.

The results showed that LockBit was the fastest with 5 minutes and 50 seconds, followed by Babuk at 6 minutes 34 seconds. The notorious Conti encrypted the files in just under one hour, with Maze and Mespinoza being the slowest, at nearly two hours. The average across all strains was 43 minutes.

Ransomware encryption time

“The average median duration demonstrates a limited window of time to respond to a ransomware attack once the encryption process is underway,” Splunk researchers noted. “This can prove even more limiting considering that the catastrophic apex may be when a single critical file is encrypted, rather than the whole of the victim’s data. With such factors in play, it may prove to be extremely difficult, if not impossible, for the majority of organizations to mitigate a ransomware attack once the encryption process begins.”

The analysis also showed that only some ransomware takes advantage of better hardware to speed up the encryption process. The amount of memory that a device has does not appear to have a significant influence, and storage disk speeds may lead to faster encryption, but this is most likely if the malware can also take full advantage of a CPU’s capabilities.

“We observed that some families utilized increased system resources better than others,” the researchers said in their report. “Some of the families were very efficient, while others tended to utilize large percentages of CPU time along with very high disk access rates. There was no direct correlation between a sample using a larger amount of system resources with a faster encryption speed. Some ransomware families performed worse, or even crashed, when deployed on the faster test systems.”

Related: Researchers Devise Method to Decrypt Hive Ransomware-Encrypted Data

Related: University Project Cataloged 1,100 Ransomware Attacks on Critical Infrastructure

Related: Mamba Ransomware Leverages DiskCryptor for Encryption, FBI Warns

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...


The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Management & Strategy

Industry professionals comment on the recent disruption of the Hive ransomware operation and its hacking by law enforcement.

Malware & Threats

Threat actors are increasingly abusing Microsoft OneNote documents to deliver malware in both targeted and spray-and-pray campaigns.


Dole was forced to shut down systems in North America due to a ransomware attack, which has reportedly led to salad shortages in some...