https://www.techtarget.com/searchsecurity/tip/Common-lateral-movement-techniques-and-how-to-prevent-them
In the early days of hacking, cyber attackers conducted smash-and-grab campaigns with the goal of getting as much data as possible in one strike.
Today, malicious actors are much more methodical, especially given how valuable digital assets are. Attackers study and profile their victims, determining which vulnerabilities they can penetrate covertly. Once inside a victim's device or system, attackers often hide out for a while to uncover ways to further their attacks to other areas in the network and reach other hosts, devices or applications.
This type of attack is known as a lateral movement attack. Let's look at how these attacks work and the different lateral movement techniques attackers use.
Lateral movement occurs after attackers successfully compromise an environment and move deeper into the network or system. In most instances, attackers are looking for employee credentials. They try to escalate their privileges using administrative accounts, such as IT managers and network and systems administrators, to access more sensitive assets.
Once they find valuable data or assets, attackers slowly move that data to their own environments. The whole process could take a week or longer. The goal is to remain undetected until it is too late for the victim to react. Ideally, by the time a breach has been detected, the cyber attacker is completely out of the system.
Malicious actors plan their attacks during what is known as the reconnaissance phase. They scan their victims' network infrastructure to learn about hierarchies, OSes, devices and sensitive data.
To do this, attackers use a number of tools, including the following:
Once attackers complete the reconnaissance phase, they need to next access credentials or escalate privileges. Some basic lateral movement attacks use social engineering to trick users into giving up their credentials. Four common lateral movement techniques are the following:
Discovering lateral movement attacks are difficult because attackers act as covertly as possible. It can take months to detect unusual movement or activities. Therefore, prevention is the best bet. Three ways to mitigate the risk of a lateral attacks are the following:
10 Nov 2022