Patch management goes from hard, to ludicrous in the agentic AI era

The Asymmetry of Speed: Patch Management in the Age of Mythos

The release of Anthropic’s “Claude Mythos Preview” suggests a potential ‘before/after’ shift in vulnerability discovery velocity for enterprise security. AI has held the potential to be a tool that would "help" defenders. But as recent weeks have shown, Mythos isn't just a helper; it is a potential catalyst for what M.G. Siegler at Spyglass calls a "Casual Catastrophe." It is a model that finds issues not because it is a force of superintelligence in the sci-fi sense, but because it operates at a scale of intelligence and time that humans simply cannot match. For enterprise security teams, this shift transforms the mundane task of patch management into a high-stakes, race where hours matter. We are NOT trying to beat the drums of fear on the AI cybersecurity band wagon over here, but we do want to highlight some of the potential future issues that A.I tools such as Mythos could unlock.

Old Bugs

Historically, security teams prioritized patches for the newest vulnerabilities. The logic was often implicit: older, widely-used code was assumed to have lower marginal risk because it had been exercised and reviewed repeatedly. Agentic discovery tools challenge that assumption. In its first few weeks, the Mythos model was reported to have identified a 27-year-old vulnerability in OpenBSD and a 16-year-old flaw in FFmpeg, reportedly in code that had already passed extensive automated testing. 

As Siegler points out, these aren't issues humans couldn't find; they are issues humans wouldn't find. Humans lack the patience to scrutinize every line of a twenty-year-old dependency. Models can. For the enterprise, this means your "technical debt" is no longer just a performance drag—it is a live, automated firing range for agentic AI. The silver lining, at least for now, is that the operational cost of finding the OpenBSD vulnerability was still pretty high (estimated to be about $20,000), and the cost of acquiring these vulnerabilities has not collapsed at the same rate that the speed of discovery has.

The Collapse of the Deployment Window

The "Patch Window" used to be a grace period. A vulnerability would be announced (a CVE), and teams had days or weeks to test and deploy a fix before a reliable exploit was developed.

With agentic tools, patch-diffing automation, and LLM-assisted exploit development, that patch window is tightening, sometimes dramatically for high-value or internet-facing targets.Additionally, unlike human attackers who might stop at one entry point, automated tooling can identify additional vulnerabilities in a single system and autonomously chain them. 

AI-driven analysis is shrinking the window between patch release and exploit development, increasing the importance of fast, risk-based patch deployment. If your deployment cycle takes 48 hours, you may already be effectively too late. Enterprises must target patching velocity that is as fast and autonomous as the attacks themselves for the highest-risk classes (e.g., internet-facing, identity, remote management, and externally reachable third-party components). 

The New "Black Box" Attack Surface - Hardware

As enterprises rush to build out the infrastructure for 2026-era AI, they are introducing increasingly heterogeneous platforms—accelerators (GPUs/TPUs), ARM-based hosts, and specialized NIC/DPUs and firmware-managed components.

This creates a "Visibility Gap":  attackers are more inclined to target firmware and management-plane components because they can bypass OS-level controls and complicate detection and recovery. These vulnerabilities are "silent" and often bypass traditional OS-level security patches. Patching a firmware vulnerability often requires a reboot or a "cold start" of hardware clusters. In an era of 24/7 AI-driven operations, the "downtime" required to patch hardware is often seen as more expensive than the risk of the bug itself—a gamble economically motivated adversaries may exploit.

Vibe Coding…so hot right now, but….

Another pressure point is the way we build software. We’ve entered the era of "Vibe Coding, “ where developers use AI to generate entire modules from a “vibe” or high-level prompts. Productivity rises, but so does dependency sprawl: AI-assisted builds can introduce obscure open-source components and transitive (“shadow”) dependencies that security teams don’t realize are in production. Just as importantly, AI-generated code often ships with less shared understanding, reducing the defender’s traditional advantage of knowing how the system is supposed to behave.

The "Mythos Quandary" is that we’re trying to solve a machine-speed problem with a human-speed process. Enterprise security has to move toward faster, higher-confidence patch deployment for defined high-risk classes. Where patch SLAs can’t meet exposure timelines, compensating controls and "virtual patching" can buy time by blocking known exploit paths, but they do not remove the need to patch.

As it relates to ransomware, the probability of a true systemic extortion event occurring has increased dramatically. WannaCry and NotPetya are reminders of how quickly vulnerability-driven disruption can go systematic. Mythos-class capabilities in the hands of cyber criminals is a future that we should treat as a plausible near-term scenario and plan accordingly, without assuming every actor will have equal capability.

The practical takeaway is uncomfortable but clear: in the agentic AI era, patching is no longer a maintenance function, it’s a race condition. The organizations that hold up will be the ones that can ship fixes fast for the few systems that truly matter, surround everything else with compensating controls that actually reduce exposure, and maintain enough software and asset visibility to know what they’re defending. The rest will be forced to make high-stakes decisions, under outage pressure with imperfect facts, on an adversary’s timeline.

Ransom Payment Amounts in Q1 2026 

Average Ransom Payment

$680,081

+15% from Q4 2025

Median Ransom Payment

$300,750

-7% from Q4 2025

The 15% increase in average payments to $680,081 highlights the continued success of sophisticated groups targeting large enterprises with data-exfiltration-only incidents. Conversely, the 7% dip in median payments to $300,750 suggests that mid-market and smaller organizations are becoming more resilient, likely due to improved backup protocols and a firmer refusal to pay for data exfiltration alone.

Most Common Ransomware Variants in Q1 2026

Rank Ransomware Type Market Share % Change in Ranking from Q4 2025
1 Inc Ransom 13% New in Top Variants
1 Lone Wolf 13% +2
2 Akira 12% -1
3 Anubis 8% New in Top Variants
3 Qilin 8% -1
3 Shiny Hunters 8% +3

Market Share of the Ransomware attacks

As with all Coveware by Veeam data, these figures reflect first-hand, observed casework. The most common groups carrying out cyber extortion attacks in Q1 2026 represents a dichotomy of extortion strategy. INC, Akira and Qilin remain the most active encryption-focused groups, while “Lone Wolf” operators and brands such as ShinyHunters account for a meaningful share of overall extortion activity. Where ShinyHunters- and Lone Wolf-style campaigns skew toward data-exfiltration-only pressure, a disproportionate share of cases that ultimately result in payment continues to concentrate among encryption-led groups. Across both models, business interruption remains the strongest driver of payment outcomes.

Overall, companies continue to resist cyber extortion pressure. Payment rates across Coveware-managed ticked up slightly to 23%. Despite this trend, we continue to see incidents where clients receive biased or miscalibrated guidance driven by weak threat-actor attribution and stale intelligence. Attribution of loosely affiliated “lone wolf” operators remains especially challenging, and maintaining accurate, current intelligence is now table stakes for defensible incident response decision-making.

Data-theft-only payment rates continue to show quarter-to-quarter volatility, but they remain structurally low, reinforcing that data-theft-only extortion converts poorly for threat actors. Such sustained suppression reflects a meaningful posture shift: enterprises increasingly begin data theft- incidents from a starting posture of non-payment by default. Practically, this supports an executive stance that payment should be treated as an exception rather than a primary mitigation level, especially as experience continues to show that payment rarely delivers durable risk reduction as data deletion promises are unverifiable, data may be retained/resold, and payment does not reliably prevent future targeting or secondary extortion. A critical data point we continue to emphasize is that re-extortion (victim being extorted for the same dataset) and default (release of the data despite assurances it was destroyed) can take months or even a year to materialize, and the short-term appearance of “promises kept” should not be characterized as evidence that the bad actors are honoring their word.

Most Common Ransomware Attack Vectors in Q1 2026

Initial access patterns in Q1 2026 continue to consolidate around remote access compromise, but “remote access” increasingly means SaaS + identity-backed pathways (SSO, OAuth grants, connected apps, and administrative access) rather than just legacy VPN/RDP. In practice, many intrusions no longer look like a break-in; they look like legitimate logins followed by persistence. That convergence matters operationally: initial access and persistence are effectively the same problem, because threat actors are aiming to log in and stay long enough to escalate privileges, move laterally, and execute extortion objectives.

Within that context, phishing/social engineering remains a major mechanism, but it is less frequently the final “labeled” vector because successful campaigns often culminate in outcomes that present as remote access compromise: token theft, MFA resets, password resets, or delegated access. These attacks increasingly target help desks and identity recovery workflows and can remain low-signal until a meaningful change occurs (new enrollments, privilege changes, or data access/exfiltration). The priority detection posture shifts accordingly: abnormal admin actions, new OAuth apps/connected apps, impossible travel/new geographies and devices, unusual MFA reset or enrollment patterns, and anomalous support activity.

Finally, software vulnerability exploitation remains a lower-frequency but high-consequence path and continues an upward drift, particularly in internet-facing appliances and management planes, where patch lag and “migration hygiene” gaps (exposed services, leftover accounts/configuration) create fast conversion opportunities. 

Most Common Ransomware Tactics in Q1 2026

In Q1 2026, the top observed tactics reinforce a familiar reality: most cyber extortion events of impact are still hands-on-keyboard operations where attackers prioritize the ability to move, stage, and maintain control long enough to create leverage.

Lateral Movement remained the most consistently observed tactic (79%). That consistency matters: east‑west movement is the operational backbone of many intrusions, and it often rides on legitimate administrative paths that can blend into normal activity. The practical implication is unchanged: organizations that can detect and contain lateral movement quickly tend to preserve more recovery options and maintain better negotiating leverage.

Exfiltration continued to function as the primary leverage mechanism (73%), not merely a precursor to encryption. Even when exfiltration appears “lower” in observed telemetry, it often reflects visibility limits or attacker speed rather than reduced intent. Treat data theft as an executive risk issue (legal, regulatory, and reputational) as much as a technical one, because attackers do.

Impact rose into the top three (58%), aligning with what leadership experiences most acutely: business interruption is frequently the defining feature of the event. This category is also sensitive to evidence capture and logging quality, so the ranking should be read as directional rather than absolute. The decision implication is that recovery planning and decision authority (who can isolate, who can rebuild, who can approve shutdowns) matters as much as detection.

Command and Control also climbed into the top five (58%), suggesting more cases where responders can directly observe active operator connectivity (beacons or remote management channels). Disrupting C2 can reduce attacker tempo, but it can also change adversary behavior (switch tooling, shift access methods, or accelerate impact so containment needs coordination and clear executive decision paths.

Finally, Defense Evasion remained a core enabling tactic (52%). A lower rank does not mean it’s less important; it often reflects what can be observed, especially when evasion succeeds. The control message holds: identity gaps, endpoint coverage gaps, and logging blind spots are still the seams attackers hunt first.

Most common Industry and Company sizes impacted by Ransomware in Q1 2026

While Healthcare (17.6%) and Consumer Services (15.3%) represent the largest shares of ransomware impact in Q1 2026, highlighting attackers’ focus on sectors with both low tolerance for downtime and high density of data, Professional Services (11.8%) and Financial Services (9.4%) underscore continued targeting of “data-rich” organizations. These sectors remain attractive because the threat of leaking sensitive client or regulated data (e.g., legal records or financial statements) can be more coercive than encryption alone. At the same time, “must-operate” organizations like Public Sector (7.1%) and Healthcare are targeted because disruption quickly becomes a public-facing continuity issue, where pressure is driven by service delivery and safety, not just profit. While there was a short-lived trend post-Colonial Pipeline for some groups to maintain “industry exemption” lists sparing certain sectors, we often see those erode over time, with many RaaS groups indiscriminately impacting healthcare and critical infrastructure along with other common sectors.

The 11–100 and 101–1,000 tiers,account for two-thirds of all attacks. Ransomware-as-a-service (RaaS) affiliates are finding the highest "Return on Investment" (ROI) by targeting smaller organizations with low cost, low payout, but high probability of payout attacks. Only 5% of victims have over 100,000 employees. This explains why the Average Payment ($680k) is rising even though the Median ($300k) is falling. 

The observed increase in median victim size is driven by a parallel surge in targeted, big-game-hunting attacks by mainly data-theft focused actors. In quarters where opportunistic RaaS groups have controlled the highest market share, we see commensurate decreases in median company size.

Read more from the frontlines of cyber extortion.