During a cyberattack, the system that a cyber threat actor first accesses within an organization’s network is rarely their final objective. For example, many cyberattacks are focused on stealing, encrypting, or destroying valuable data, which is stored in databases, but attackers enter an organization’s systems via phishing or other techniques that enable them to compromise a user’s workstations.
Once they’ve gained a foothold on an organization’s systems, attackers commonly move laterally to access other systems and data within the organization’s environment. This may include expanding their permissions or compromising other accounts to gain access to additional resources.
Once inside an organization’s environment, cybercriminals can use various means to expand their access.
Some common techniques include the following:
While attackers may use multiple techniques for lateral movement, the overall process remains largely the same.
The three main stages of lateral movement include:
Companies can take various steps to prevent or detect attackers moving laterally through their network.
Some best practices include the following:
Ideally, an attacker would be identified and blocked before they gained access to an organization’s systems. However, if this doesn’t happen, locking down their access and preventing them from achieving their goals is the next best thing.
Check Point solutions provide companies with the visibility and data analytics that they need to identify and crack down on lateral movement in their networks. Check Point Horizon XDR offers centralized visibility and advanced threat analytics to help security teams detect the subtle signs of threats moving through their network. Learn more about protecting your network with Check Point by signing up for the Horizon XDR Early Availability Program today.