Misplaced Pages

Lateral movement (cybersecurity)

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Cybersecurity term for attack strategies This article is about technique used by computer hackers. For the equestrianism term, see Lateral movement.

Lateral movement refers to the techniques that cyber attackers, or threat actors, use to progressively move through a network as they search for the key data and assets that are ultimately the target of their attack campaigns. While the development of more sophisticated sequences of attack has helped threat actors develop better strategies and evade detection as compared to the past, similar to planning a heist, cyber defenders have also learned to use lateral movement against attackers in that they use it to detect their location and respond more effectively to an attack.

Lateral movement is a part of the ATT&CK framework within the 14 categories of Tactics, Techniques, and Procedures.

References

  1. ^ Lateral Movement: When Cyber Attacks Go Sideways
  2. Cyber Dwell Time and Lateral Movement
  3. Malware Lateral Movement


Stub icon

This computer security article is a stub. You can help Misplaced Pages by expanding it.

Categories: