A-Z Glossary of Information Security and Social Engineering Terms

Lateral movement

Lateral movement

Attackers don’t always aim for their prime target the first time. Instead, they might pick an “easier” target first, which acts as a beachhead. From there, they can move laterally across the network. For example, they might use a “pass the hash attack” to steal the credentials stored on a warehouse computer in order to access a system elsewhere in the organisation without leaving a trail of failed login attempts behind. Or the attackers might exploit open network shares. Lateral movement attacks perfectly illustrate why robust IT security must encompass every department and every individual of an organisation.

Got a question?

If you would like to make an enquiry about any of our services click the "Contact Us Now" button and fill in your details.