What Is Lateral Movement?
Lateral movement is the set of methods attackers use to spread through a network after they gain their first foothold. Once inside, the attacker does not stay on the first machine they breach. Instead, they move sideways, from one system to another, looking for higher-value targets, sensitive data, and ways to deepen their control. In short, lateral movement turns a single breach into a full-scale attack.
The MITRE ATT&CK framework lists lateral movement as tactic TA0008, one of the core stages in the attack chain. Research shows that up to 70% of cyber attacks involve lateral movement (Carbon Black). Moreover, the average time from initial access to lateral movement is now just 29 minutes (CrowdStrike). This means security teams have less than half an hour to catch and stop an attacker before they spread across the network. Speed is the one thing that tips the balance between a minor event and a full-scale breach. If your team can act in that 29-minute gap, you stop the spread cold. If not, the attacker has a free path through the whole network.
This guide covers the stages of lateral movement, the most common techniques attackers use, how to spot the signs, and what you can do to defend against this critical threat. For a broader view of how lateral movement fits into the full threat landscape, see our guide to cybersecurity basics.
Lateral movement is how attackers move east-west through a network after gaining initial access. They use stolen account credentials, exploit remote services, and abuse built-in tools on operating systems to reach new machines while trying to avoid detection. The goal: find sensitive data, escalate privileges, and set up for data exfiltration or ransomware deployment.
Why Lateral Movement Matters
The first machine an attacker breaches is rarely the final target. A phished employee’s laptop does not hold the crown jewels. The database server does. Lateral movement is the bridge between the initial breach and the real damage. Without it, most attacks would stall at a low-value endpoint and cause little harm.
However, when attackers succeed at lateral movement, the results are severe. They can reach domain controllers, steal intellectual property, deploy ransomware across every machine, or carry out mass data exfiltration. According to Fidelis, the average cost of a breach that involves lateral movement tops $4.35 million. Nearly 90% of firms face this threat at some point (Vectra). The stakes are high because lateral movement is what turns a minor incident into a full-blown crisis. A single breached laptop can lead to a domain-wide lockout if the attacker moves fast enough. The cost gap between a contained event and a full breach is massive. That gap is the true cost of lateral movement. Prevention is always the smarter path.
Understanding lateral movement is essential for any security team. If you can detect and stop lateral movement early, you contain the blast radius. If you miss it, the attacker gains free rein across your entire network. This is why detecting and preventing lateral movement is one of the highest-priority goals in modern defense.
The Stages of Lateral Movement
Lateral movement follows a clear pattern. Each stage builds on the last, and the attacker repeats the cycle as they move deeper into the network. Knowing the stages of lateral movement helps defenders set traps at each step.
Stage 1: Reconnaissance
After landing on the first machine, the attacker maps the network. They scan for active hosts, open ports, shared drives, and domain structure. Built-in tools on operating systems like net view, nltest, and ipconfig give them a clear picture without triggering alarms. The goal is to find high-value targets such as domain controllers, file servers, and databases that hold sensitive data. This stage is quiet and fast. Most of it leaves little trace in logs. By the time a defender notices, the attacker has already mapped half the network. This is why you must catch them early or not at all.
Stage 2: Credential Theft
To move to the next machine, the attacker needs valid account credentials. Credential dumping is one of the most common methods. Tools like Mimikatz extract password hashes, kerberos tickets, and plaintext passwords from memory. The attacker can also capture credentials through keyloggers or by reading cached authentication data on the breached host. Once they have valid account credentials, they can log into other systems as a real user, making their activity hard to tell apart from normal work.
Stage 3: Privilege Escalation
With stolen credentials, the attacker looks for ways to gain higher access. Privilege escalation is the process of moving from a standard user account to an admin or domain admin account. Attackers exploit misconfigs, unpatched software, or weak access control settings to climb the privilege ladder. Each step up gives them unauthorized access to more systems and more sensitive data. The jump from regular user to admin is the most dangerous moment in the whole chain.
Stage 4: Movement and Persistence
Now the attacker moves to new machines using the stolen credentials and elevated privileges. They use legitimate tools and protocols, such as RDP, SMB, WMI, and PowerShell, to connect to other hosts. Because these are the same tools admins use every day, the activity blends into normal traffic and helps the attacker avoid detection. At each new machine, they repeat the cycle. Scan. Steal. Escalate. Move. They also plant backdoors to maintain access even if one entry point is found and closed.
Focus your monitoring on the credential theft and movement stages. Watch for tools like Mimikatz in memory, unusual authentication events (Windows Event IDs 4624, 4625, 4648, 4769), and admin tools being used from endpoints that are not admin workstations. These are the clearest signals of active lateral movement.
Common Lateral Movement Techniques
Ultimately, attackers choose their movement technique based on the target’s defenses, the tools available on the host, and the account credentials they have stolen. Here are the most common types of attacks used for lateral movement.
Other Movement Techniques
Beyond these four, attackers also use SSH for Linux movement, SMB shares for file-based spreading, internal spear phishing from breached email accounts, and exploitation of software flaws on adjacent hosts. Credential dumping feeds all of these methods because each one requires valid account credentials or password hashes to succeed. The more credentials the attacker steals, the more paths they have for lateral movement.
Lateral Movement and Ransomware
Lateral movement and ransomware are tightly linked. Modern ransomware gangs do not encrypt a single machine and call it a day. Instead, they use lateral movement to spread across the entire network before triggering encryption on every reachable host at once. This maximizes damage and pressure on the victim to pay.
The attack chain is clear: gain access, move laterally, steal data, then encrypt. By the time the ransom note appears, the attacker has already been inside for days or weeks. They have mapped the network, found every backup server, and staged copies of sensitive data for data exfiltration. Stopping lateral movement early breaks this chain and limits the blast radius of any ransomware event. If the attacker can only reach one host, the ransom demand loses its teeth. That is the power of good segmentation and access control.
RDP abuse is the top method for ransomware-related lateral movement. About 90% of ransomware breaches involve it (Sophos). Locking down RDP, using multi-factor authentication, and watching for unusual remote sessions are some of the best defenses. For more, see our guide to endpoint security.
How to Detect Lateral Movement
Admittedly, lateral movement is hard to spot because attackers use the same tools and protocols as real admins. However, there are signals that stand out if you know what to look for. Detecting and preventing lateral movement requires layered monitoring.
Network-Based Detection
Watch for unusual east-west traffic between systems that do not normally talk to each other. A workstation connecting to a domain controller at odd hours, or a server suddenly reaching out to many endpoints, are strong signals. Network detection tools and SIEM platforms can correlate these events and flag them. For more on SIEM, see our SIEM guide.
Identity-Based Detection
Since 82% of attacks use valid credentials instead of malware (CrowdStrike), identity monitoring is critical. Watch for a single user account logging into many systems in a short time, failed authentication attempts across multiple hosts, and use of service accounts from unexpected endpoints. Tools like user and entity behavior analytics (UEBA) build a baseline of normal activity and flag deviations that may signal lateral movement.
Endpoint-Based Detection
EDR tools on each host can catch credential dumping tools in memory, suspicious use of PowerShell or WMI, and attempts to access password hashes or kerberos tickets. These endpoint signals are often the earliest warning of lateral movement. When combined with network and identity data, they give security teams a full picture of what the attacker is doing. See our endpoint detection and response guide.
Common Signs of Active Lateral Movement
So how do you know if an attacker is moving through your network right now? Here are the top signs to watch for.
- One account, many logins: A single user account logs into ten or more hosts in a short span. Real users rarely do this. This is one of the clearest signs of an active movement attack.
- Admin tools on user desks: Tools like PsExec, WMI, or PowerShell run on a machine that is not an admin host. If a sales rep’s laptop starts using PsExec, that is a red flag. Normal users do not run these tools.
- Off-hours RDP: RDP sessions that start at 3 a.m. or on a holiday point to an attacker, not a real user. Watch for remote sessions at times when no one should be working. Set alerts for any RDP session that starts outside core hours.
More Warning Signs
- New service accounts: An attacker may create new service accounts or add old ones to high-privilege groups. Watch for changes to Active Directory that no one asked for or approved. Any new high-privilege account needs a check.
- Failed logins in bulk: A wave of failed login tries across many hosts means someone is testing stolen account credentials. This is a classic sign of pass the hash or brute force.
- Gaps in logs: If logs from a host go silent or show signs of being cleared, an attacker may have wiped their tracks. Centralized, write-locked logging stops this trick. If your logs are safe, the trail stays intact no matter what the attacker does.
No single sign proves an attack is in progress. However, when two or more appear at the same time, treat it as a high-priority event. Fast action at this stage can stop the breach before the attacker gets what they came for. Your team’s speed in this window is what decides the outcome.
Detecting and Preventing Lateral Movement: A Defense Plan
Clearly, stopping lateral movement requires action at every layer. Here is a practical plan that covers the most impactful steps.
For expert help building these defenses, our cybersecurity services team can assess your exposure and deploy the right controls.
Lateral Movement in the Kill Chain
Obviously, lateral movement does not happen in a vacuum. It sits in the middle of the attack chain, after initial access and before the attacker reaches their final goal. Understanding where lateral movement fits helps defenders prioritize their resources.
Before lateral movement: The attacker gains a foothold through phishing, exploiting a public-facing app, or using stolen credentials from a prior breach. At this stage, only one machine is breached. The damage is limited if you catch it here.
During lateral movement: The attacker scans, steals credentials, escalates privileges, and moves to new machines. This is the most active and most detectable phase. Every hop creates log entries, authentication events, and network traffic patterns that defenders can spot.
After lateral movement: The attacker reaches their target. This could be data exfiltration, ransomware deployment, or planting a long-term backdoor. By this point, the damage is done or about to be done. Recovery is costly, slow, and painful. Every day of cleanup adds to the bill.
The window for detection is widest during the lateral movement phase. This is where your tools and team can make the biggest impact. This is where defenders should focus their sharpest tools and most alert monitoring. If you catch the attacker here, you prevent the worst outcomes.
How Attackers Avoid Detection
Essentially, stealth is the core skill behind lateral movement. Attackers go to great lengths to avoid detection at every step. Here is how they stay hidden.
Using built-in tools. Instead of dropping custom malware, attackers use tools that are already on the host. PowerShell, WMI, PsExec, and RDP are all standard admin tools on most operating systems. Since these tools are normal, their use does not trigger most alarms. This is the living-off-the-land style, and it fuels 84% of severe breaches. It works so well because no one flags tools that are meant to be there.
Blending into normal traffic. Lateral movement traffic looks like regular admin work. RDP sessions, SMB file access, and service account logins happen every day in large networks. The attacker blends in by using valid account credentials, keeping volumes low, and moving at the pace of normal work. Consequently, only tools that build a baseline of normal behavior can spot the difference.
Moving slowly. Some attackers are in no rush. They move one hop per day or per week. By spreading their lateral movement over a long period, they reduce the chance that any single event triggers an alert. This is why dwell times can stretch into months before the attacker is found. The slow-and-low approach is the hallmark of advanced threat actors who plan their moves with care.
Clearing tracks. Attackers delete logs, clear event records, and disable logging on systems they touch. If your log chain has gaps, that itself is a signal worth checking. However, centralized logging to a write-protected SIEM makes it much harder for attackers to erase their trail.
Lateral Movement and Access Control
Certainly, weak access control is what makes lateral movement possible. When any user account can reach any server, the attacker has a highway. When access is tight and segmented, the attacker hits walls at every turn. This section covers how access control stops lateral movement.
Least privilege. Every user account and service account should have only the permissions it needs. Nothing more. When a breached account has limited reach, the attacker cannot move far. Review and tighten permissions regularly.
Admin account separation. Never use domain admin accounts for daily work. Create separate accounts for admin tasks and limit where those accounts can log in. This stops attackers from harvesting high-value account credentials from everyday endpoints.
Zero trust principles. Do not trust any connection by default, even from inside the network. Verify identity, device health, and context for every session. Zero trust removes the assumption that internal traffic is safe, which is exactly the assumption lateral movement exploits.
Service account hardening. Service accounts with broad access are prime targets. They often have old passwords that never rotate. Lock down service account access to only the systems they need. Set passwords to rotate on a schedule. Monitor any authentication from a service account that does not match its expected pattern.
Strong access control does not stop the initial breach. However, it stops the breach from becoming a disaster by blocking the attacker’s paths for lateral movement. Tight access control is the one thing that shows up in every post-breach report as “should have been better.” For deeper coverage, see our cloud security guide.
Lateral Movement in Cloud and Hybrid Setups
Lateral movement is not just an on-site problem. As firms move to cloud and hybrid setups, attackers follow. The paths are different, but the goal is the same: move from one resource to the next until they reach what they want.
Cloud-to-cloud movement. Once an attacker gains access to one cloud account, they can use that account’s trust links to reach other cloud services. IAM roles, shared storage, and federated logins create paths that did not exist in older on-site networks. Each linked service is a new hop for the attacker. Mapping these trust links is key to spotting where the risk hides. Each link is a path an attacker could take.
Hybrid pivoting. Moreover, in hybrid setups, attackers may start in the cloud and pivot to on-site systems, or the reverse. A breached cloud admin console can give an attacker a path to on-site servers through VPN or sync tools. This makes access control between cloud and on-site systems a top priority. Lock down the bridge. If you leave it open, the attacker will cross it without a second thought.
Container and workload hopping. Likewise, in container setups like Kubernetes, attackers can move from one container to another by exploiting shared resources or weak network policies. This type of movement is fast because containers share the same host and often have flat internal networks. Without strict pod-level policies, one breached container opens the door to all the rest. This is a growing risk as more firms move to container-based setups for speed and scale.
The same core defenses apply: segment access, protect credentials, and monitor traffic. However, cloud and hybrid setups need cloud-native tools that understand IAM roles, service accounts, and API-based access. For more, see our cloud security guide.
Real-World Lateral Movement Attacks
Understanding how lateral movement plays out in real breaches helps defenders recognize the patterns. Here are three well-known examples.
Each of these cases followed the same pattern: gain access, move laterally, reach the target. Better access control, credential protection, and segmentation could have limited or stopped the lateral movement in every case. The lessons from these real-world movement attacks are clear: the basics matter more than any fancy tool. Patch, segment, and protect your credentials. That is what stops lateral movement in its tracks. Fancy tools help, but the basics win most fights.
Tools for Stopping Lateral Movement
Fortunately, several categories of tools help security teams detect and block lateral movement across the network.
EDR and XDR. Endpoint detection and response tools monitor each host for suspicious process activity, credential dumping attempts, and connections to remote services. Extended detection and response (XDR) correlates signals across endpoints, network, and identity for a fuller picture. See our XDR guide for more.
Network segmentation platforms. Microsegmentation tools let you define which systems can talk to which, down to the application level. Any connection that breaks the rules is blocked. This directly prevents lateral movement by removing the paths attackers rely on.
SIEM and UEBA. SIEM collects and correlates logs from across the network. UEBA adds behavior baselines for each user account and flags unusual patterns. Together, they catch lateral movement signals like a single account authenticating to many hosts in a short window.
Privileged access management (PAM). PAM tools secure admin accounts by vaulting credentials, enforcing session recording, and requiring approval for high-risk actions. They prevent attackers from using stolen admin account credentials to escalate and move.
Threat intelligence. Real-time feeds of known attacker tools, IPs, and techniques help detection systems catch lateral movement faster. When your tools know what Mimikatz looks like, or what pass the ticket traffic looks like, they block it sooner. See our threat intelligence guide.
Lateral movement is the most detectable phase of an attack, but only if you are watching. Combine network segmentation, credential protection, identity monitoring, and endpoint detection to catch attackers as they move. Every hop the attacker makes creates a signal. Your job is to catch it before they reach the crown jewels.
The Future of Lateral Movement Defense
The fight against lateral movement is shifting in several key ways.
Identity-first security. Since 82% of lateral movement uses valid credentials, the focus is moving from network controls to identity controls. Notably, passwordless login, real-time identity checks, and just-in-time access are all gaining ground. These controls make stolen credentials less useful. When a password alone is not enough to log in, the attacker has to find a new path. That extra step buys your team the time it needs to catch them.
Microsegmentation. Instead of broad network zones, microsegmentation defines rules for each workload. A web server can talk to its database but nothing else. This level of detail blocks paths that broad segmentation would miss. The tighter the rules, the less room the attacker has to move. Start with your most critical systems and work outward from there.
Technology Shifts Ahead
AI-driven detection. Furthermore, machine learning models trained on normal network patterns can flag lateral movement faster than rule-based tools. They catch subtle shifts in traffic, login patterns, and tool usage that human analysts and static rules would miss.
Automated response. When lateral movement is detected, speed matters. Similarly, automated response tools can isolate the affected host, kill the session, and lock the compromised user account in seconds. Manual response is too slow when breakout times average just 29 minutes. By the time a human logs in to check, the attacker has already moved on.
The core principle stays the same: make every hop harder, slower, and louder. As attackers evolve, defenders must evolve faster. The firms that invest in these areas now will be the hardest to breach in the years ahead. The race between attacker speed and defender speed will only get faster. Plan for that now. The tools you pick today shape how well you defend next year. Make each choice count. Build for the long term, not just the next audit.
Frequently Asked Questions
Stopping Attackers Before They Spread
Lateral movement is the most dangerous phase of a cyber attack. It is also the most detectable. Every hop an attacker makes leaves traces. Login events, network flows, and tool usage all tell a story. The question is whether your defenses are set up to catch those traces in time. If they are, you win. If they are not, the attacker does. It is that simple. There is no middle ground.
Start with segmentation. Limit what each user account can reach. Protect credentials by disabling old protocols and deploying credential guard. Monitor east-west traffic and authentication events around the clock. Test your defenses with red team exercises that simulate lateral movement. Every gap you find and fix today is one less path for the next attacker.
Lateral movement turns a single breached endpoint into a network-wide disaster. But it only works when the network lets it. Build your defenses so that every move the attacker makes gets harder, slower, and more visible. The firms that stop lateral movement stop the breach. Build your network so that every step the attacker takes gets harder and leaves a trail. That is how you win. Start today, and keep at it every day from here. The attackers never stop. Neither should you. Your network is worth every bit of the effort. The data it holds is the heart of your business. Protect it the way it deserves to be protected.
References:
- MITRE ATT&CK – Lateral Movement (TA0008)
- CrowdStrike Global Threat Report
- CISA – Cyber Threats and Advisories
Join 1 million+ technology professionals. Weekly digest of new terms, threat intelligence, and architecture decisions.