InfoSec

Lateral Movement

The techniques that a cyberattacker uses after gaining initial access to move deeper into a network, mapping out its structure, searching for sensitive data and other high-value assets. By moving from the initial machine that was first breached, attackers are often able to prolong their access, even if the original attack site is discovered. Attackers will typically try to obtain additional credentials and elevate their access privileges as they go.