{"id":61929,"date":"2022-04-14T12:11:00","date_gmt":"2022-04-14T16:11:00","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=61929"},"modified":"2022-10-06T13:19:11","modified_gmt":"2022-10-06T17:19:11","slug":"what-is-lateral-movement","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/what-is-lateral-movement","title":{"rendered":"What Is Lateral Movement?"},"content":{"rendered":"\n

Lateral movement can quickly take a breach from bad to catastrophic. A sophisticated and prevalent attack technique, lateral movement is an advanced persistent threat (APT) that can be difficult to detect and combat. <\/p>\n\n\n\n

Unfortunately, preventative security isn\u2019t enough to keep lateral movement attacks at bay. In today\u2019s treacherous cybersecurity climate, experts advise us to think of attacks as inevitable: plan for when<\/em> they occur rather than if<\/em>. It\u2019s critical that organizations develop measures to both prevent lateral movement attacks and<\/em> mitigate them when they occur to minimize damage.<\/p>\n\n\n\n

To help organizations understand how to approach lateral movement, this blog covers the basics of lateral movement as well as top detection, prevention, and mitigation methods. <\/p>\n\n\n\n

What Is Lateral Movement?<\/strong><\/h2>\n\n\n\n

Lateral movement is the access of additional resources or elements in an organization’s infrastructure after initial entry. Often, lateral movement involves gathering elevated credentials and permissions to access more critical and sensitive data. It\u2019s one of the top ways cybercriminals maximize damage during an attack.<\/p>\n\n\n\n

As CrowdStrike<\/a> puts it, \u201clateral movement is a key tactic that distinguishes today\u2019s advanced persistent threats (APTs)<\/a> from simplistic cyberattacks of the past.\u201d APTs are sophisticated and stealthy attacks that gain prolonged access to a network, facilitating reconnaissance, strategic attack planning, and critical data compromise. <\/p>\n\n\n\n

How Does Lateral Movement Work? <\/strong><\/h2>\n\n\n\n

Lateral movement starts with initial access to an account, network, or resource, and escalates as the attacker leverages that access to move through the infrastructure. Typically, lateral movement attackers carve themselves a path to the most critical data by breaking through security layers and gathering additional privileges. Often, they hold this data for ransom in ransomware attacks, which are growing in popularity<\/a> and considered a top security threat<\/a>. <\/p>\n\n\n\n

While there is no one way for lateral movement attacks to unfold, they typically follow certain patterns and go through some of the same key steps. The following are some of the most common tactics and steps in a typical lateral movement attack. <\/p>\n\n\n\n

Network or Infrastructure Access<\/h4>\n\n\n\n

Lateral movement requires initial access to the network or infrastructure. Bad actors can gain this initial access through just about any weak point in the infrastructure, from an unprotected server to a vulnerable application or an employee account. Initial access doesn\u2019t always require sophisticated hacking techniques: phishing attacks<\/a>, for example, use low-tech tactics that are highly effective in tricking users into sharing account access with threat actors. <\/p>\n\n\n\n

This initial resource access becomes the vehicle bad actors use to traverse the network or infrastructure. In systems where a traditional perimeter is the main barrier to entry, lateral movement can occur unhindered as soon as the actor gains access to the main network. In environments with continuous authentication, however, the access would stop there unless the bad actor is able to get through the next authentication point. <\/p>\n\n\n\n

Privilege Gathering and Escalation<\/h4>\n\n\n\n

Attackers often gain access to additional resources by using a legitimate account, either infiltrating an account that already has high-level access privileges or infiltrating a standard account and adding to or escalating its privileges. To seize high-permission accounts directly, attackers may use targeted initial infiltration techniques, like whaling<\/a>. To gather or escalate privileges on a standard account, attackers often leverage network or operating system vulnerabilities. This method typically involves more reconnaissance and back-end manipulation.<\/p>\n\n\n\n

Reconnaissance <\/h4>\n\n\n\n

Many attackers wait to strike, leveraging lateral movement for reconnaissance and attack preparation purposes. Often, this includes scouting out ways to gain administrative privileges and pathways to the most sensitive data. <\/p>\n\n\n\n

After conducting reconnaissance, cybercriminals can mount a swift, coordinated attack. Usually, these attacks do the most damage to the most critical resources \u2014 and in many cases, attackers freeze these critical resources until paid a hefty ransom.<\/p>\n\n\n\n

Credential Dumping<\/h4>\n\n\n\n

Hackers often look for credentials to steal once inside an organization\u2019s infrastructure. Often, they can find and pull many at once; some systems, for example, store clear-text passwords that hackers can immediately put to use. Credential dumping is the process of copying and exfiltrating those credentials, either to use as part of their attack (e.g., to escalate their privileges) or to sell, hold for ransom, or otherwise compromise.<\/p>\n\n\n\n

How to Detect Lateral Movement<\/strong><\/h2>\n\n\n\n

Because lateral movement can masquerade as a legitimate user and move from resource to resource, it can be hard to detect. Further, movement among accounts and resources makes stopping an attack difficult: shutting down the original compromised resource wouldn\u2019t lock the attacker out of the additional resources they gained access to through lateral movement. So, how can organizations defend against lateral movement attacks?<\/p>\n\n\n\n

Robust Reporting <\/h3>\n\n\n\n

One of the best ways to stop and minimize the damage of lateral movement is through early detection. Detecting an attacker before they can gather and elevate their access minimizes the attack\u2019s spread and makes it easier to remove them from the network.<\/p>\n\n\n\n

The key to detecting lateral movement is gaining thorough understanding and visibility of your network and infrastructure with the right reporting tools. At a minimum, your reporting system should have sufficient event logging to allow security teams to follow a lateral movement attack\u2019s path; the more robust your reporting tool, the better chances you have of detecting and stopping attacks. The JumpCloud directory<\/a>, for example, consolidates the IT infrastructure in one platform and can report on everything from mobile device activity to SAML events at once. This makes it easy to view and analyze end-to-end events across users, devices, applications, networks, and more. <\/p>\n\n\n\n

Ideally, reporting tools should combine with activity analysis and alerts to head off suspicious activity. Read on to learn more about detecting and mitigating lateral movement with behavior analysis and threat hunting. <\/p>\n\n\n\n

Behavior Analysis<\/h3>\n\n\n\n

Telemetry can be enhanced with behavior analysis for better lateral movement detection and prevention. Examples of detectable behaviors that might indicate a lateral movement attack include: <\/p>\n\n\n\n