Network Lateral Movement, or simply Lateral Movement, refers to the techniques that cyber attackers, or threat actors, use to progressively move through a network as they search for the key data and assets that are ultimately the target of their attack campaigns.[1][2][3] While development of more sophisticated sequences of attack has helped threat actors develop better strategies and evade detection as compared to the past, similar to planning a heist, cyber defenders have also learned to use lateral movement against attackers in that they use it to detect their location and respond more effectively to an attack.[1]
YouTube Encyclopedic
-
1/3Views:3693 0281 254
-
Splunk Threat Research - AD Lateral Movement
-
Understanding Purdue Model for ICS Security
-
🔴 Detect Lateral Movement in Microsoft Environment with Suricata (Part 1)
Transcription
ATT&CK framework
Lateral movement is a part of ATT&CK framework, within the 14 categories of Tactics, Techniques, and Procedures.
References