Back to Glossary
Attack Types Cybersecurity Glossary

Lateral Movement

Techniques used by attackers to progressively move through a network after initial compromise.

Full Definition

Lateral movement refers to the techniques threat actors use to progressively navigate through a network after gaining initial access, seeking higher-value targets, sensitive data, or privileged systems. It is a critical phase in most advanced attacks and the stage at which a breach transforms from a single compromised endpoint to a full network intrusion.\n\nCommon lateral movement techniques include pass-the-hash, pass-the-ticket, Kerberoasting, abuse of legitimate admin tools (PsExec, WMI, PowerShell), and exploitation of trust relationships between systems. Attackers may move laterally for weeks or months, mapping the environment and escalating privileges before executing their final objective.\n\nDetecting lateral movement requires network segmentation, behavioral analytics, zero-trust architecture, and monitoring of privileged account usage. Stolen credentials from infostealers frequently provide the keys for lateral movement without requiring exploits.

Related Terms

Threat Intelligence Platform

Monitor Your Exposure on Whiteintel

Understanding threats is the first step. Whiteintel continuously monitors dark web sources, stealer logs, and breach databases so you know the moment your organization's data is at risk.

Ready to Protect Your Digital Assets?

Start monitoring your organization's exposure to credential leaks and dark web threats today.