Lateral movement is the gradual network infiltration to reach a desired target. After getting access to a network, hackers can navigate from one process to another until they get the best position to steal or compromise data. Lateral movement is part of the advanced persistent threats (APTs).

Lateral Movement Stages

  1. Reconnaissance: Attacker studies network structure, naming conventions, and other important details needed for infiltration. This stage is similar to cybersecurity vulnerability assessments conducted by cybersecurity experts.
  2. Infiltration: The attacker stealthily enters the network using reconnaissance data and starts to move across it. Social engineering is a common technique hackers use to steal data and penetrate the network.
  3. Access: Once hackers acquire the target, they execute attack objectives such as deploying malware, destroying data, or stealing data.

Stopping Lateral Movement

What Types of Attacks Use Lateral Movement?