Back to CyberPedia
Lateral Movement

What Is Lateral Movement?
How Attackers Spread Through Networks and How to Stop Them

Lateral movement is how attackers move through a network after gaining their first foothold, hopping from system to system using stolen credentials, remote services, and built-in admin tools. This article covers the stages of lateral movement, common techniques like pass-the-hash and pass-the-ticket, how to detect the signs, and a five-step defense plan covering segmentation, credential protection, and continuous monitoring.

24 min read
Cybersecurity
17 views

What Is Lateral Movement?

Lateral movement is the set of methods attackers use to spread through a network after they gain their first foothold. Once inside, the attacker does not stay on the first machine they breach. Instead, they move sideways, from one system to another, looking for higher-value targets, sensitive data, and ways to deepen their control. In short, lateral movement turns a single breach into a full-scale attack.

The MITRE ATT&CK framework lists lateral movement as tactic TA0008, one of the core stages in the attack chain. Research shows that up to 70% of cyber attacks involve lateral movement (Carbon Black). Moreover, the average time from initial access to lateral movement is now just 29 minutes (CrowdStrike). This means security teams have less than half an hour to catch and stop an attacker before they spread across the network. Speed is the one thing that tips the balance between a minor event and a full-scale breach. If your team can act in that 29-minute gap, you stop the spread cold. If not, the attacker has a free path through the whole network.

This guide covers the stages of lateral movement, the most common techniques attackers use, how to spot the signs, and what you can do to defend against this critical threat. For a broader view of how lateral movement fits into the full threat landscape, see our guide to cybersecurity basics.

Lateral Movement at a Glance

Lateral movement is how attackers move east-west through a network after gaining initial access. They use stolen account credentials, exploit remote services, and abuse built-in tools on operating systems to reach new machines while trying to avoid detection. The goal: find sensitive data, escalate privileges, and set up for data exfiltration or ransomware deployment.

Why Lateral Movement Matters

The first machine an attacker breaches is rarely the final target. A phished employee’s laptop does not hold the crown jewels. The database server does. Lateral movement is the bridge between the initial breach and the real damage. Without it, most attacks would stall at a low-value endpoint and cause little harm.

However, when attackers succeed at lateral movement, the results are severe. They can reach domain controllers, steal intellectual property, deploy ransomware across every machine, or carry out mass data exfiltration. According to Fidelis, the average cost of a breach that involves lateral movement tops $4.35 million. Nearly 90% of firms face this threat at some point (Vectra). The stakes are high because lateral movement is what turns a minor incident into a full-blown crisis. A single breached laptop can lead to a domain-wide lockout if the attacker moves fast enough. The cost gap between a contained event and a full breach is massive. That gap is the true cost of lateral movement. Prevention is always the smarter path.

70%
Attacks involve lateral movement (Carbon Black)
29min
Average breakout time to lateral movement (CrowdStrike)
82%
Attacks use valid credentials, not malware (CrowdStrike)

Understanding lateral movement is essential for any security team. If you can detect and stop lateral movement early, you contain the blast radius. If you miss it, the attacker gains free rein across your entire network. This is why detecting and preventing lateral movement is one of the highest-priority goals in modern defense.

The Stages of Lateral Movement

Lateral movement follows a clear pattern. Each stage builds on the last, and the attacker repeats the cycle as they move deeper into the network. Knowing the stages of lateral movement helps defenders set traps at each step.

Stage 1: Reconnaissance

After landing on the first machine, the attacker maps the network. They scan for active hosts, open ports, shared drives, and domain structure. Built-in tools on operating systems like net view, nltest, and ipconfig give them a clear picture without triggering alarms. The goal is to find high-value targets such as domain controllers, file servers, and databases that hold sensitive data. This stage is quiet and fast. Most of it leaves little trace in logs. By the time a defender notices, the attacker has already mapped half the network. This is why you must catch them early or not at all.

Stage 2: Credential Theft

To move to the next machine, the attacker needs valid account credentials. Credential dumping is one of the most common methods. Tools like Mimikatz extract password hashes, kerberos tickets, and plaintext passwords from memory. The attacker can also capture credentials through keyloggers or by reading cached authentication data on the breached host. Once they have valid account credentials, they can log into other systems as a real user, making their activity hard to tell apart from normal work.

Stage 3: Privilege Escalation

With stolen credentials, the attacker looks for ways to gain higher access. Privilege escalation is the process of moving from a standard user account to an admin or domain admin account. Attackers exploit misconfigs, unpatched software, or weak access control settings to climb the privilege ladder. Each step up gives them unauthorized access to more systems and more sensitive data. The jump from regular user to admin is the most dangerous moment in the whole chain.

Stage 4: Movement and Persistence

Now the attacker moves to new machines using the stolen credentials and elevated privileges. They use legitimate tools and protocols, such as RDP, SMB, WMI, and PowerShell, to connect to other hosts. Because these are the same tools admins use every day, the activity blends into normal traffic and helps the attacker avoid detection. At each new machine, they repeat the cycle. Scan. Steal. Escalate. Move. They also plant backdoors to maintain access even if one entry point is found and closed.

Detection Tip

Focus your monitoring on the credential theft and movement stages. Watch for tools like Mimikatz in memory, unusual authentication events (Windows Event IDs 4624, 4625, 4648, 4769), and admin tools being used from endpoints that are not admin workstations. These are the clearest signals of active lateral movement.

Common Lateral Movement Techniques

Ultimately, attackers choose their movement technique based on the target’s defenses, the tools available on the host, and the account credentials they have stolen. Here are the most common types of attacks used for lateral movement.

Pass the Hash
In a pass-the-hash attack, the attacker uses stolen password hashes to log into another machine without knowing the actual password. NTLM authentication on Windows allows this because the hash alone is enough to prove identity. This movement technique works on systems that still use older authentication protocols.
Pass the Ticket
Pass the ticket exploits Kerberos authentication. The attacker steals kerberos tickets from memory and uses them to access remote services on other machines in the domain. Since Kerberos is the default authentication method in Active Directory, this movement technique is common in enterprise networks.
Remote Desktop Protocol (RDP)
RDP lets users control a remote machine over the network. Attackers with valid account credentials use RDP to hop from one system to another. About 90% of ransomware breaches involve RDP abuse (Sophos). Restricting RDP access is one of the most impactful steps to slow lateral movement.
Living Off the Land
Instead of dropping malware, attackers use tools already on the host: PowerShell, WMI, PsExec, and other admin utilities built into operating systems. This helps them avoid detection because no new software is installed. About 84% of severe breaches involve living-off-the-land tactics (Illumio).

Other Movement Techniques

Beyond these four, attackers also use SSH for Linux movement, SMB shares for file-based spreading, internal spear phishing from breached email accounts, and exploitation of software flaws on adjacent hosts. Credential dumping feeds all of these methods because each one requires valid account credentials or password hashes to succeed. The more credentials the attacker steals, the more paths they have for lateral movement.

Lateral Movement and Ransomware

Lateral movement and ransomware are tightly linked. Modern ransomware gangs do not encrypt a single machine and call it a day. Instead, they use lateral movement to spread across the entire network before triggering encryption on every reachable host at once. This maximizes damage and pressure on the victim to pay.

The attack chain is clear: gain access, move laterally, steal data, then encrypt. By the time the ransom note appears, the attacker has already been inside for days or weeks. They have mapped the network, found every backup server, and staged copies of sensitive data for data exfiltration. Stopping lateral movement early breaks this chain and limits the blast radius of any ransomware event. If the attacker can only reach one host, the ransom demand loses its teeth. That is the power of good segmentation and access control.

RDP abuse is the top method for ransomware-related lateral movement. About 90% of ransomware breaches involve it (Sophos). Locking down RDP, using multi-factor authentication, and watching for unusual remote sessions are some of the best defenses. For more, see our guide to endpoint security.

How to Detect Lateral Movement

Admittedly, lateral movement is hard to spot because attackers use the same tools and protocols as real admins. However, there are signals that stand out if you know what to look for. Detecting and preventing lateral movement requires layered monitoring.

Network-Based Detection

Watch for unusual east-west traffic between systems that do not normally talk to each other. A workstation connecting to a domain controller at odd hours, or a server suddenly reaching out to many endpoints, are strong signals. Network detection tools and SIEM platforms can correlate these events and flag them. For more on SIEM, see our SIEM guide.

Identity-Based Detection

Since 82% of attacks use valid credentials instead of malware (CrowdStrike), identity monitoring is critical. Watch for a single user account logging into many systems in a short time, failed authentication attempts across multiple hosts, and use of service accounts from unexpected endpoints. Tools like user and entity behavior analytics (UEBA) build a baseline of normal activity and flag deviations that may signal lateral movement.

Endpoint-Based Detection

EDR tools on each host can catch credential dumping tools in memory, suspicious use of PowerShell or WMI, and attempts to access password hashes or kerberos tickets. These endpoint signals are often the earliest warning of lateral movement. When combined with network and identity data, they give security teams a full picture of what the attacker is doing. See our endpoint detection and response guide.

Common Signs of Active Lateral Movement

So how do you know if an attacker is moving through your network right now? Here are the top signs to watch for.

  • One account, many logins: A single user account logs into ten or more hosts in a short span. Real users rarely do this. This is one of the clearest signs of an active movement attack.
  • Admin tools on user desks: Tools like PsExec, WMI, or PowerShell run on a machine that is not an admin host. If a sales rep’s laptop starts using PsExec, that is a red flag. Normal users do not run these tools.
  • Off-hours RDP: RDP sessions that start at 3 a.m. or on a holiday point to an attacker, not a real user. Watch for remote sessions at times when no one should be working. Set alerts for any RDP session that starts outside core hours.

More Warning Signs

  • New service accounts: An attacker may create new service accounts or add old ones to high-privilege groups. Watch for changes to Active Directory that no one asked for or approved. Any new high-privilege account needs a check.
  • Failed logins in bulk: A wave of failed login tries across many hosts means someone is testing stolen account credentials. This is a classic sign of pass the hash or brute force.
  • Gaps in logs: If logs from a host go silent or show signs of being cleared, an attacker may have wiped their tracks. Centralized, write-locked logging stops this trick. If your logs are safe, the trail stays intact no matter what the attacker does.

No single sign proves an attack is in progress. However, when two or more appear at the same time, treat it as a high-priority event. Fast action at this stage can stop the breach before the attacker gets what they came for. Your team’s speed in this window is what decides the outcome.

Detecting and Preventing Lateral Movement: A Defense Plan

Clearly, stopping lateral movement requires action at every layer. Here is a practical plan that covers the most impactful steps.

Step 1
Segment Your Network
Divide your network into isolated zones. Keep critical servers, databases, and admin systems in separate segments with strict access control rules between them. If an attacker breaches one zone, segmentation stops them from reaching the next. This is the single most effective control against lateral movement.
Step 2
Enforce Least Privilege
Give every user account only the access it needs. Remove local admin rights from standard users. Use separate admin accounts for server management. Strong access control limits how far an attacker can go even with stolen account credentials. Review permissions on a regular schedule.
Step 3
Protect Credentials
Deploy credential guard on Windows to protect password hashes and kerberos tickets in memory. Disable older authentication protocols like NTLM where possible. Use multi-factor authentication on all admin accounts. These steps block the credential dumping that fuels most lateral movement.
Step 4
Monitor and Detect
Deploy SIEM for log correlation, EDR on every endpoint, and network traffic analysis for east-west flows. Set up alerts for unusual authentication patterns, admin tool usage from non-admin hosts, and access to remote services at odd hours. Fast detection is the key to stopping lateral movement before it reaches high-value targets.
Step 5
Restrict Remote Access Tools
Lock down RDP, SSH, and other remote services. Allow them only from approved jump servers. Block PowerShell and WMI on endpoints that do not need them. Since living-off-the-land attacks use these tools, restricting them removes the attacker’s best paths for lateral movement.

For expert help building these defenses, our cybersecurity services team can assess your exposure and deploy the right controls.

Lateral Movement in the Kill Chain

Obviously, lateral movement does not happen in a vacuum. It sits in the middle of the attack chain, after initial access and before the attacker reaches their final goal. Understanding where lateral movement fits helps defenders prioritize their resources.

Before lateral movement: The attacker gains a foothold through phishing, exploiting a public-facing app, or using stolen credentials from a prior breach. At this stage, only one machine is breached. The damage is limited if you catch it here.

During lateral movement: The attacker scans, steals credentials, escalates privileges, and moves to new machines. This is the most active and most detectable phase. Every hop creates log entries, authentication events, and network traffic patterns that defenders can spot.

After lateral movement: The attacker reaches their target. This could be data exfiltration, ransomware deployment, or planting a long-term backdoor. By this point, the damage is done or about to be done. Recovery is costly, slow, and painful. Every day of cleanup adds to the bill.

The window for detection is widest during the lateral movement phase. This is where your tools and team can make the biggest impact. This is where defenders should focus their sharpest tools and most alert monitoring. If you catch the attacker here, you prevent the worst outcomes.

How Attackers Avoid Detection

Essentially, stealth is the core skill behind lateral movement. Attackers go to great lengths to avoid detection at every step. Here is how they stay hidden.

Using built-in tools. Instead of dropping custom malware, attackers use tools that are already on the host. PowerShell, WMI, PsExec, and RDP are all standard admin tools on most operating systems. Since these tools are normal, their use does not trigger most alarms. This is the living-off-the-land style, and it fuels 84% of severe breaches. It works so well because no one flags tools that are meant to be there.

Blending into normal traffic. Lateral movement traffic looks like regular admin work. RDP sessions, SMB file access, and service account logins happen every day in large networks. The attacker blends in by using valid account credentials, keeping volumes low, and moving at the pace of normal work. Consequently, only tools that build a baseline of normal behavior can spot the difference.

Moving slowly. Some attackers are in no rush. They move one hop per day or per week. By spreading their lateral movement over a long period, they reduce the chance that any single event triggers an alert. This is why dwell times can stretch into months before the attacker is found. The slow-and-low approach is the hallmark of advanced threat actors who plan their moves with care.

Clearing tracks. Attackers delete logs, clear event records, and disable logging on systems they touch. If your log chain has gaps, that itself is a signal worth checking. However, centralized logging to a write-protected SIEM makes it much harder for attackers to erase their trail.

Lateral Movement and Access Control

Certainly, weak access control is what makes lateral movement possible. When any user account can reach any server, the attacker has a highway. When access is tight and segmented, the attacker hits walls at every turn. This section covers how access control stops lateral movement.

Least privilege. Every user account and service account should have only the permissions it needs. Nothing more. When a breached account has limited reach, the attacker cannot move far. Review and tighten permissions regularly.

Admin account separation. Never use domain admin accounts for daily work. Create separate accounts for admin tasks and limit where those accounts can log in. This stops attackers from harvesting high-value account credentials from everyday endpoints.

Zero trust principles. Do not trust any connection by default, even from inside the network. Verify identity, device health, and context for every session. Zero trust removes the assumption that internal traffic is safe, which is exactly the assumption lateral movement exploits.

Service account hardening. Service accounts with broad access are prime targets. They often have old passwords that never rotate. Lock down service account access to only the systems they need. Set passwords to rotate on a schedule. Monitor any authentication from a service account that does not match its expected pattern.

Strong access control does not stop the initial breach. However, it stops the breach from becoming a disaster by blocking the attacker’s paths for lateral movement. Tight access control is the one thing that shows up in every post-breach report as “should have been better.” For deeper coverage, see our cloud security guide.

Lateral Movement in Cloud and Hybrid Setups

Lateral movement is not just an on-site problem. As firms move to cloud and hybrid setups, attackers follow. The paths are different, but the goal is the same: move from one resource to the next until they reach what they want.

Cloud-to-cloud movement. Once an attacker gains access to one cloud account, they can use that account’s trust links to reach other cloud services. IAM roles, shared storage, and federated logins create paths that did not exist in older on-site networks. Each linked service is a new hop for the attacker. Mapping these trust links is key to spotting where the risk hides. Each link is a path an attacker could take.

Hybrid pivoting. Moreover, in hybrid setups, attackers may start in the cloud and pivot to on-site systems, or the reverse. A breached cloud admin console can give an attacker a path to on-site servers through VPN or sync tools. This makes access control between cloud and on-site systems a top priority. Lock down the bridge. If you leave it open, the attacker will cross it without a second thought.

Container and workload hopping. Likewise, in container setups like Kubernetes, attackers can move from one container to another by exploiting shared resources or weak network policies. This type of movement is fast because containers share the same host and often have flat internal networks. Without strict pod-level policies, one breached container opens the door to all the rest. This is a growing risk as more firms move to container-based setups for speed and scale.

The same core defenses apply: segment access, protect credentials, and monitor traffic. However, cloud and hybrid setups need cloud-native tools that understand IAM roles, service accounts, and API-based access. For more, see our cloud security guide.

Real-World Lateral Movement Attacks

Understanding how lateral movement plays out in real breaches helps defenders recognize the patterns. Here are three well-known examples.

Target
HVAC Vendor to Payment Systems
Attackers breached Target through an HVAC vendor with network access. They used stolen account credentials to move laterally from the vendor’s access point to the payment processing systems. The result: 40 million credit card records stolen. This movement attack showed how supply chain access can enable lateral movement deep into a retailer’s network.
SolarWinds
Supply Chain to Government Networks
Attackers breached the SolarWinds Orion build process and used the update channel to reach thousands of customer networks. Once inside each network, they performed careful lateral movement using pass the ticket and other techniques to reach email servers and sensitive data stores. This is one of the largest movement attacks in history.
Colonial Pipeline
VPN to Operational Technology
A single breached VPN password, on a user account without multi-factor authentication, gave attackers initial access. They moved laterally through the IT network, forcing the company to shut down fuel distribution as a precaution. The incident showed how lateral movement from IT to operational systems can have physical-world consequences.

Each of these cases followed the same pattern: gain access, move laterally, reach the target. Better access control, credential protection, and segmentation could have limited or stopped the lateral movement in every case. The lessons from these real-world movement attacks are clear: the basics matter more than any fancy tool. Patch, segment, and protect your credentials. That is what stops lateral movement in its tracks. Fancy tools help, but the basics win most fights.

Tools for Stopping Lateral Movement

Fortunately, several categories of tools help security teams detect and block lateral movement across the network.

EDR and XDR. Endpoint detection and response tools monitor each host for suspicious process activity, credential dumping attempts, and connections to remote services. Extended detection and response (XDR) correlates signals across endpoints, network, and identity for a fuller picture. See our XDR guide for more.

Network segmentation platforms. Microsegmentation tools let you define which systems can talk to which, down to the application level. Any connection that breaks the rules is blocked. This directly prevents lateral movement by removing the paths attackers rely on.

SIEM and UEBA. SIEM collects and correlates logs from across the network. UEBA adds behavior baselines for each user account and flags unusual patterns. Together, they catch lateral movement signals like a single account authenticating to many hosts in a short window.

Privileged access management (PAM). PAM tools secure admin accounts by vaulting credentials, enforcing session recording, and requiring approval for high-risk actions. They prevent attackers from using stolen admin account credentials to escalate and move.

Threat intelligence. Real-time feeds of known attacker tools, IPs, and techniques help detection systems catch lateral movement faster. When your tools know what Mimikatz looks like, or what pass the ticket traffic looks like, they block it sooner. See our threat intelligence guide.

Key Takeaway

Lateral movement is the most detectable phase of an attack, but only if you are watching. Combine network segmentation, credential protection, identity monitoring, and endpoint detection to catch attackers as they move. Every hop the attacker makes creates a signal. Your job is to catch it before they reach the crown jewels.

The Future of Lateral Movement Defense

The fight against lateral movement is shifting in several key ways.

Identity-first security. Since 82% of lateral movement uses valid credentials, the focus is moving from network controls to identity controls. Notably, passwordless login, real-time identity checks, and just-in-time access are all gaining ground. These controls make stolen credentials less useful. When a password alone is not enough to log in, the attacker has to find a new path. That extra step buys your team the time it needs to catch them.

Microsegmentation. Instead of broad network zones, microsegmentation defines rules for each workload. A web server can talk to its database but nothing else. This level of detail blocks paths that broad segmentation would miss. The tighter the rules, the less room the attacker has to move. Start with your most critical systems and work outward from there.

Technology Shifts Ahead

AI-driven detection. Furthermore, machine learning models trained on normal network patterns can flag lateral movement faster than rule-based tools. They catch subtle shifts in traffic, login patterns, and tool usage that human analysts and static rules would miss.

Automated response. When lateral movement is detected, speed matters. Similarly, automated response tools can isolate the affected host, kill the session, and lock the compromised user account in seconds. Manual response is too slow when breakout times average just 29 minutes. By the time a human logs in to check, the attacker has already moved on.

The core principle stays the same: make every hop harder, slower, and louder. As attackers evolve, defenders must evolve faster. The firms that invest in these areas now will be the hardest to breach in the years ahead. The race between attacker speed and defender speed will only get faster. Plan for that now. The tools you pick today shape how well you defend next year. Make each choice count. Build for the long term, not just the next audit.

Frequently Asked Questions

Frequently Asked Questions
What is lateral movement in cybersecurity?
Lateral movement is the process by which attackers move through a network after gaining initial access. They use stolen account credentials, exploit remote services, and abuse built-in tools on operating systems to hop from one system to another. The goal is to reach sensitive data, escalate privileges, or deploy ransomware across the network.
What are the most common lateral movement techniques?
The most common techniques include pass the hash, pass the ticket, RDP abuse, PowerShell and WMI execution, and SMB-based file sharing. Each movement technique exploits legitimate tools and protocols to avoid detection. Credential dumping with tools like Mimikatz feeds most of these methods.
How can you detect lateral movement?
Detect lateral movement by monitoring for unusual authentication events, admin tool usage from non-admin endpoints, and east-west traffic between systems that do not normally communicate. SIEM, EDR, and UEBA tools all play a role. The key is to correlate signals across network, identity, and endpoint data.
What is the best way to prevent lateral movement?
The best defense combines network segmentation, least-privilege access control, credential protection, and continuous monitoring. Restrict admin tools, disable outdated protocols, and use multi-factor login on all high-value accounts. Lock down every path the attacker might use, and then test to make sure your locks hold. These steps remove the paths and tools attackers need for lateral movement.
How is lateral movement related to ransomware?
Modern ransomware relies on lateral movement to spread across the entire network before locking down all reachable systems at once. This is what makes today’s ransomware so much more harmful than older strains. Attackers also use lateral movement to find and destroy backups before triggering encryption. Stopping lateral movement directly limits the reach and damage of a ransomware attack.

Stopping Attackers Before They Spread

Lateral movement is the most dangerous phase of a cyber attack. It is also the most detectable. Every hop an attacker makes leaves traces. Login events, network flows, and tool usage all tell a story. The question is whether your defenses are set up to catch those traces in time. If they are, you win. If they are not, the attacker does. It is that simple. There is no middle ground.

Start with segmentation. Limit what each user account can reach. Protect credentials by disabling old protocols and deploying credential guard. Monitor east-west traffic and authentication events around the clock. Test your defenses with red team exercises that simulate lateral movement. Every gap you find and fix today is one less path for the next attacker.

Lateral movement turns a single breached endpoint into a network-wide disaster. But it only works when the network lets it. Build your defenses so that every move the attacker makes gets harder, slower, and more visible. The firms that stop lateral movement stop the breach. Build your network so that every step the attacker takes gets harder and leaves a trail. That is how you win. Start today, and keep at it every day from here. The attackers never stop. Neither should you. Your network is worth every bit of the effort. The data it holds is the heart of your business. Protect it the way it deserves to be protected.

References:


Stay Updated
Get the latest terms & insights.

Join 1 million+ technology professionals. Weekly digest of new terms, threat intelligence, and architecture decisions.