
Lateral movement, in a cybersecurity context, refers to the way attackers expand their reach into a compromised network by moving horizontally from different systems in order to try and uncover valuable data or find privileged accounts. Once attackers gain an initial foothold, typically through a compromised endpoint, lateral movement allows them to strengthen their position inside the environment, explore internal systems, and quietly advance toward more sensitive assets.
Attackers usually find, access, and compromise your high-value assets as part of this process. They can move to hijack sensitive data, escalate privileges, and evade defenses in real time. It is not the first breach that does the most damage in the attack lifecycle, but what happens after the primary breach, when the attacker can then dwell inside the systems, or move laterally throughout the internal systems, typically for weeks before being discovered.
Lateral movement attacks are a crucial component of modern cyberattacks, playing a significant role in advanced persistent threats (APTs) and ransomware operations. They represent one of the most dangerous and most difficult phases of an attack to detect in the cyber kill chain.
In this blog post, we will examine the meaning of lateral movement, how these types of attacks operate, and how you can leverage identity governance, network segmentation, and Zero Trust strategies to detect and contain them before they spread throughout your organisation.
Key Takeaways
Simply put, lateral movement occurs after an attacker has infiltrated your network. Rather than moving directly to a primary target, they will "move sideways" through various systems, applications, or users to locate valuable credentials, sensitive data, or higher privileges.
Imagine an intruder making entry through an unlocked side door and then making his way through a series of rooms to locate the vault. This so-called "east–west" movement within the network can often mimic normal user or admin activity, making it exceedingly difficult to detect.
Lateral movement has its purpose and is contrasted to vertical movement, where the attacker escalates their privileges on a specific system (for example, from standard user to admin). In this situation, lateral movement is spreading across systems - using existing trust relationships, weak credentials, or misconfigured permissions, to get further access.
In the cyber kill chain, lateral movement occurs between initial access and data exfiltration. This is the point in an attack when the attacker begins to consolidate control to prepare for the endgame, whether that will be to exfiltrate data, deploy ransomware, or build a persistence capability inside the environment.
After gaining access to your environment, the next step for attackers is lateral movement to locate high-value systems, collect better credentials and escalate privileges. This usually takes place in three stages: internal reconnaissance, credential harvesting and lateral movement.
Internal reconnaissance represents the stage at which attackers are attempting to understand your environment from the inside. When starting with an initial access, they assess your environment, observe your infrastructure, understand how the systems are interconnected, and start to look for targets or weak points. This is where attackers are evaluating the vulnerabilities in your network and identifying the lowest effort decisions to pivot to more direct access.
Once the attackers are "inside", they start with the task of mapping your internal environment, which systems are available, what capabilities or privileges they have, which networks can be traversed, etc. Attackers scan internal IP ranges, Active Directory objects, user groups, and any listeners or other assets of which they can find access.
Common tools like Nmap, BloodHound and AD enumeration scripts help adversaries to locate misconfigured systems, exposed services and the path of least resistance to domain control.
When reconnaissance has been completed, the next move is to steal credentials and escalate their access. This is the footprint from identity-based attacks becoming dangerous, because once an adversary can impersonate a legitimate user, bypassing many traditional defences becomes easier.
Common techniques related to credential theft, credential dumping from LSASS, Mimikatz, Pass-the-Hash, Pass-the-Ticket, and Kerberoasting, enable credential stealing and credential abuse or misuse.
Reconnaissance will elevate access; it's only a first step into moving across the network, meaning the adversary can now do higher-impact actions without restriction. They can alter system configurations, view sensitive data, create accounts, mitigate defences, plus prepare to act on larger objectives that meet the adversary’s goals, like data theft or deploying ransomware.
As attacks achieve higher privileges, they will begin pivoting and travelling deeper into the network, often to fully access new systems, applications, or sensitive data.
Attackers will typically spread laterally using RDP, SMB, PsExec, WinRM and PowerShell, often disguising themselves as legitimate users, are even use admin shares to remain hidden.
One of the most notable examples is the SolarWinds compromise in 2020, where attackers were able to move and expand access across multiple internal systems through the use of stolen credentials and their identity-based lateral movement behaviour.
Malicious actors utilise trusted tools, legitimate protocols, and built-in capabilities of the system to progress laterally without notice. Much like legitimate administrators operate, these tactics blend into the normal use of identity and network activity, making these undesirable behaviours that much harder to identify.
Attackers acquire a hashed version of a user's password or a Kerberos ticket from a compromised system. Rather than going through the trouble of cracking it, they simply take the hash or ticket and log in as that user without the password verification process and MFA. This allows them to surreptitiously jump from system to system without raising typical alerts for authenticating. Pass-the-Hash attacks depend heavily on the presence of active, outdated, unmonitored, or unnecessary accounts.
With acquired or weak credentials, attackers can access remote services, often referred to by their protocol name, such as RDP (remote Windows login), SSH (remote login for Linux systems), and SMB (file sharing protocol).
These protocols will be commonly used in an enterprise environment and use cases like IT jobs, and become similar to normal expected behaviour, allowing attackers the comfort to pivot and move laterally across systems and services.
Attackers capitalise on the implicit trust relationships present between systems - such as domain trusts in Active Directory, shared service accounts, or overly permissive API/VM permissions.
Once trust is compromised on one of the trusted systems, attackers can leap through environments (for example, parent-child AD domains or cloud workloads) without needing new credentials.
Rather than utilising malware, attackers use built-in administrative tools - PowerShell, WMI, and PsExec - to execute commands, move files, or take control of endpoints. Due to the legitimacy and pre-installation of these tools, the activity appears normal, and this is why they are also referred to as "LOTL" - Living off the Land. The capture of the behaviour from these tools can be exceptionally difficult to detect.
Credential replay is when an attacker uses previously stolen username/password pairs to access other systems without any modifications, rather than trying the same username/password as a set of credentials on another system or platform. Kerberoasting occurs against a Kerberos service for service accounts, the attacker extracts a service ticket, cracks the encryption offline, seizing elevated privileges and, in many cases, total domain compromise.
The most notable cyberattacks in the past ten years indicate that lateral movement is often the most significant phase of a breach. When attackers gain entry to a single endpoint or application, they employ identity-based techniques to expand their access, elevate privileges, and penetrate mission-critical systems. It is this internal proliferation that converts a contained event into an enterprise-wide breach.
Here is a summary of three prominent cases of lateral movement that greatly expanded the scope and scale of the attack.
The SolarWinds event is perhaps the clearest example of how lateral movement can weaponise trusted relationships. Attackers compromised the Orion build server, inserted a malicious backdoor (Sunburst) into bona fide updates that propagated to SolarWinds customers, and expanded its footprint.
Once inside the SolarWinds customer environments, attackers did the following:
Since Orion was a trusted system with extensive privileges, the lateral spread was stealthy, quick, and extraordinarily difficult to detect, affecting more than 18,000 organisations.
In May of 2017, the WannaCry ransomware attack constituted a worldwide epidemic, targeting systems based on Microsoft Windows. After infecting a system, WannaCry encrypted users' files and demanded a ransom in Bitcoin for decrypting the files. The impact of WannaCry was amplified for two main reasons: many organisations were still using outdated Windows systems, and had little to no understanding of how critical security patches work to mitigate important vulnerabilities (which allowed WannaCry to spread much faster than it should have).
WannaCry even demonstrated a highly dangerous form of lateral movement: automated worm-like propagation. Once a single device was infected, it utilised the EternalBlue SMB exploit to efficiently intrude upon internal networks without the intervention of the attacker.
Some attacking attributes of internal spread are:
This type of lateral spread resulted in outages in hospitals, manufacturers, telecoms, and others, turning one compromised endpoint into thousands.
Modern ransom groups (Conti, LockBit, BlackCat, etc.) are fully reliant on these lateral capabilities within networks for maximum operational impact. An attacker that has been granted initial access to a network typically:
By weaponising Active Directory privileges, a single coordinated push can encrypt entire organisations very quickly, making recovery costly and slow.
It is important to identify lateral movement early because attackers often carry out moves silently for long periods before executing an observable attack. The bulk of detection methods rely on behaviour analytics, log correlation and anomalies to optimise against normal patterns of identity or network behaviour.
When lateral movement is attempted by attackers, even subtle activity on its behalf creates signals across endpoints, directories, logs on authentication and east/west traffic. The goal is to find these signals before they materialise into real compromises.
Lateral movement is comport mainly as an internal (east-west) activity, not traffic into or out of your network. Internal spikes in communication, especially between systems that do not usually communicate, may indicate reconnaissance or credential reuse.
Examples include the following:
Modern detection is increasingly dependent on correlating activity across tools:
Each of these tools can signal lateral movement involving the legitimate credentials of the victim, or while using legitimate tools associated with "living-off-the-land."
Privilege escalation is a common precursor to lateral movement. Things to look for:
A spike in privileged access and/or sudden movement to new privileges is a red flag that must be investigated for a legitimate process or an attacker attempting to expand their foothold.
Follow authentication patterns to detect credential abuse:
When authentication logs are correlated across endpoints, Active Directory, and cloud apps, the paths for lateral movement become much more apparent.
Preventing lateral movement is ultimately about reducing the number of pathways that can be exploited after an initial compromise. Two of the more effective methods are network segmentation and least privilege access, which both create structural barriers and limit how far an attacker can move, even if they have breached one system. If paired with identity-centric controls like MFA, credential hygiene, and continuous access review, organisations can contain the threat before it escalates to ransomware or a significant data breach.
Limiting every user, service account, and machine identity to just the fully needed permissions limits each user, service, and identity's lateral movement options.
If privileges are well-scoped, it will be much more difficult for an attacker to get elevation, and without elevation, lateral movement is much less effective.
Network segmentation divides your environment into smaller, isolated zones to prevent attackers from moving freely across your systems.
Segmentation transforms the lateral movement process into a maze of barriers, forcing attackers to expose themselves either with abnormal traffic patterns or authentication attempts.
Inadequate credential hygiene is one of the most frequent facilitators of lateral spread. Regular audits prevent hackers from reusing or cracking stale explanation codes.
Regular credential rotation closes off many of the silent security gaps that attackers depend on.
Identity logs provide a reliable indicator of anomalous access activity, which is key to the detection of lateral movement. Integrating identity governance (IGA) solutions increases visibility and control.
With identity being the focal point of the detection, organisations provide themselves the opportunity to disrupt attack chains before lateral movement can reach critical assets.
Identity Governance and Administration (IGA) greatly limits lateral movement by strictly ensuring users, service accounts, and machine identities have only the access they require, and nothing more. Because lateral movement often relies on excessive privileges, orphaned accounts, or unchecked access sprawl, a strong IGA program has decreased the number of pathways an attacker can employ once they compromise their target.
How IGA Collaborates with Stopping Lateral Movement:
1. Eliminates Over-Provisioned Access
IGA is typically based on the concept of least privilege and contains an ongoing review and refinement of entitlements. Over time, users typically collect an arbitrary amount of unnecessary permissions (often referred to as "privilege creep"), which are targets of opportunity during an attack. IGA functionality can help systematically reduce access and unused permissions, therefore reducing the attack surface area.
2. Strengthens Access Certifications
Regular certification campaigns enable managers and application owners to verify who should have access to what. This process usually reveals:
Once we eradicate these weak points, we have reduced how far an attacker can move into your environment.
3. Detects Unusual Access Paths Through Correlation
The integration of IGA with IAM and security tools helps uncover suspicious behaviour, such as:
Identity-level anomaly detection is critical because understanding lateral movement at the endpoint or network layer typically looks “normal”, but not at the identity layer.
4. Support a Zero Trust Strategy by Continuously Governing Entitlements
Zero Trust suggests we have to verify everything every time. IGA supports the governance layer to ensure entitlements are aligned to specific business needs so that access is:
This level of alignment will prevent an attacker from exploiting the granularity of entitlements that are either too long-lived or for which the access is no longer needed (east-west movement).
5. Automates Remediation to Break the Attack Chain
Modern IGA platforms can initiate automated workflows upon detecting suspicious identity changes, such as disabling an account, revoking a high-risk entitlement, or alerting your security teams. Organisations can thus respond before lateral movement results in an event that impacts critical business assets.
IGA + IAM = A Unified Defense
IAM manages access and authorisation, but IGA controls who should have access in the first place. Combined, the offer true visibility across identity lifecycles, and can work to identify abnormal access pathways that may show early attempts at lateral movement.
For deeper context on how governance complements identity access, check out IGA vs IAM explained.
Lateral movement is frequently the silent activator behind big cyberattacks. Most breaches are not catastrophic after an attacker gets in; they are catastrophic when the attacker can move laterally, escalate privileges, and access the target systems of value undetected. This is why preventing lateral movement is not just a best practice for security; it is a requirement for modern cyber resilience.
By improving identity governance, limiting excessive privileges, segmenting networks, and monitoring for abnormal behaviour, organisations can greatly limit an attacker’s ability to spread. Good security hygiene does not just make a breach hard; it makes a breach manageable, from being organisation-wide to isolated and contained.
Protect your critical assets by blocking lateral movement at the source. Experience IGA in action with Identity Confluence today.
1. What is lateral movement in cybersecurity?
Lateral movement involves the movement of attackers throughout a network in order to gain access to more devices, accounts, or applications, after they have already gained a foothold on one system. Instead of attacking from the outside, they remain on the inside to expand their foothold, typically using stolen credentials to gain initial access and then access the better systems to further their attack.2. Why is lateral movement dangerous?
Lateral movement is dangerous because it allows attackers to blend into normal network activity to escalate privileges and identify valuable assets. They can move using the most stealthy methods possible so that the lateral movement goes entirely unnoticed until the organisation is already dealing with either a ransomware attack, theft of data, or total compromise of the domain or other serious compromise.3. How can organisations detect lateral movement?
Organisations are able to detect lateral movement using a combination of behavioural monitoring and high-quality telemetry. Combining telemetry and activities demonstrated with monitors, such as EDR, SIEM, and UEBA, will assist in flagging anomalies such as abnormal access attempts, patterns of privilege escalation, abnormal line of traffic going east-west, or all the attempts that lead to a certain service failure. If anomalies are correlated, they can provide early telemetry or visibility into suspicious activity occurring internally.4. What tools are used for lateral movement?
Attackers often use Mimikatz (credential dumping), PsExec and PowerShell (remote execution), and frameworks like Cobalt Strike (command-and-control and pivoting). Attackers exploit legitimate administrative functions to make harmful movement look normal.5. How do I prevent lateral movement?
Preventing lateral movement involves limiting unnecessary access and tightening identity controls. Following least privilege principles, enforcing MFA on all critical systems, segmenting networks, regularly rotating credentials, and conducting IGA-based access reviews assist in blocking attacker paths. Strong monitoring and Zero Trust principles will also help to limit movement.
