Unified, automated, and ready to turn data into intelligence.
Discover how to unlock the true value of your data.
March 16-19 | Booth #935
San Jose McEnery Convention Center
A lateral move happens in cybersecurity when an attacker compromises one account or device and uses the compromise to gain access to other accounts or devices. Lateral movement and privilege escalation usually go hand in hand when an attacker moves across the network and continues to gain access with increasingly higher privileges until sensitive data is stolen. Attackers can obtain lateral movement without detection if the network does not have monitoring tools in place. To stop lateral movement, organisations need resilient security infrastructure capable of detecting anomalous patterns.
Sensitive data is usually accessible only with high-privileged user accounts, which are few in number. Low-privileged user accounts, on the other hand, are much more numerous, giving attackers more opportunities when they need any account for an initial compromise. For example, corporate tax documents are typically only accessible to accountants, CFOs, and financial analysts. While there are only a few of these accounts, lower-privileged accounts could be used to inject malware onto the network or send phishing emails to financial employees to obtain their account credentials.
Lateral movement can also give attackers access to other devices. For instance, an attacker compromises an account on a workstation with local machine access to a server. Malware can then be installed on the server. The malware might be ransomware, a remote access tool (RAT), or a script used to exfiltrate data. In most lateral moves, the goal is to obtain sensitive data.
In most lateral movements, the initial compromise is a business user account. Attackers gain access to these accounts using a few strategies: credential sprays, pass the hash, phishing, or malware injection. Here’s a brief description of each strategy:
Attackers often use phishing or malware to first obtain access to a low-privileged account. Using that user’s email account, the attacker sends a message to another user in finance, human resources, or on the executive team asking for access to a specific resource. If the phishing target obliges, the attacker now has access to sensitive data.
Cybercriminals leverage a set of tools to perform various attacks. Groups of attackers might build their own, but the hacking community has open, free-to-use applications of their own. Here are a few examples:
After an initial compromise, an attacker has limited time to elevate privileges or laterally move across the network. Before the breakout of the low-privileged account, organisations must detect strange network behavior to stop additional damage after an initial data breach. Organisations have several strategies to detect anomalous activity and stop lateral movement:
To stop lateral movement, the key to success is proactive detection and monitoring, segmenting your network, and protecting devices. Compliance regulations also require monitoring and auditing of sensitive data access requests. SIEM (security information and event management) is a good solution for monitoring and alerting administrators to unusual behaviors. To complement your security infrastructure, provide training to employees and contractors to help them identify and report potential attacks like phishing.
Get ready for the most valuable event you’ll attend this year.
Access on-demand videos and demos to see what Everpure can do.
Charlie Giancarlo on why managing data—not storage—is the future. Discover how a unified approach transforms enterprise IT operations.
Modern workloads demand AI-ready speed, security, and scale. Is your stack ready?