What is Lateral Movement? How Attackers Navigate Your Network

9 minute read
Advanced

Lateral movement is how attackers navigate from initial access to high-value targets inside your network. Learn the techniques, why it determines breach scope, and how to detect it.

How Lateral Movement Works Technically

Lateral movement begins after an attacker has established initial access to a network. That initial foothold — a compromised endpoint, a phished credential, a vulnerable internet-facing system — is rarely the target the attacker is after. It is the starting point for navigating toward the systems that actually hold what the attacker wants: the domain controller, the backup infrastructure, the financial systems, the sensitive data repositories.

The technical methods of lateral movement fall into several categories. Pass-the-Hash uses captured NTLM credential hashes to authenticate to other systems without needing the plaintext password. Because Windows authentication allows NTLM hash-based authentication in many configurations, an attacker who extracts a credential hash from one system can authenticate to other systems on the network as that user without ever knowing the actual password. Pass-the-Ticket uses stolen Kerberos tickets — the authentication tokens that Windows domain environments use for single sign-on — to access network resources. A Kerberos ticket extracted from a compromised system's memory is valid for the duration of its lifetime, typically 10 hours, giving the attacker a window to access any resource the legitimate user could access.

Kerberoasting is an offline attack against Active Directory service account credentials. Service accounts in Active Directory can be configured with Service Principal Names (SPNs), which allows any authenticated domain user to request an encrypted Kerberos service ticket for that account. The attacker requests the ticket, captures it, and attempts to crack the encryption offline using GPU-accelerated brute force. If the service account has a weak password — which is common because service accounts are often configured once and never rotated — the attacker recovers the plaintext credential.

Living-off-the-land lateral movement uses legitimate Windows administrative tools — PsExec, WMI, PowerShell remoting, Remote Desktop Protocol — to move between systems. Because these are standard IT administration tools, their use generates activity patterns that are difficult to distinguish from legitimate administrative work without behavioral baselines that establish what normal looks like for a specific environment.

Why Lateral Movement Is the Phase That Determines Breach Scope

The scope of a security incident — how many systems are compromised, how much data is accessed, what the recovery cost is — is determined almost entirely by how far an attacker moves laterally before detection and containment. An attacker who is detected and contained on the first compromised endpoint causes limited damage. An attacker who moves laterally to the domain controller, compromises administrative credentials, and gains access to backup infrastructure causes an incident that may require complete environment rebuild.

This is why lateral movement detection is the security capability with the highest leverage for limiting incident cost. Not preventing initial access — initial access will occur despite preventive controls in mature threat environments — but detecting lateral movement quickly enough to contain the attacker before they reach high-value systems. Mean time to detect lateral movement is a more meaningful security metric than perimeter penetration rate for most organizations.

The Domain Controller: Why Attackers Target It

Active Directory domain controllers are the crown jewel target of lateral movement in Windows environments. The domain controller manages authentication and authorization for every system in the domain. An attacker who compromises the domain controller — through techniques like DCSync, which allows extraction of all credential hashes from Active Directory — effectively owns the entire domain. Every account's credentials can be extracted, every system can be authenticated to, and persistent access can be established that survives password resets and device reimaging. Ransomware groups specifically prioritize domain controller access because it enables simultaneous encryption of every domain-joined system from a single point of control.

Detecting and Preventing Lateral Movement

Lateral movement detection requires combining endpoint telemetry, authentication log analysis, and network traffic monitoring — because lateral movement generates signals in all three data sources that are individually ambiguous but collectively indicative of attack activity.

On the endpoint layer, EDR platforms configured with appropriate behavioral rules detect credential dumping attempts — processes accessing LSASS memory, execution of known credential harvesting tools, and suspicious use of administrative utilities from non-administrative users. The challenge is that many of these activities also occur during legitimate administrative work, requiring behavioral baselines that distinguish anomalous from expected activity in a specific environment.

In authentication logs — Windows Event Logs and Entra ID sign-in logs — lateral movement generates patterns including authentication from unusual source systems, pass-the-hash indicators, Kerberoasting ticket requests against service accounts with SPNs, and authentication to systems that a user account does not normally access. SIEM-based detection rules against these patterns provide visibility into credential-based lateral movement that endpoint telemetry alone may not catch.

Network segmentation is the architectural control that limits lateral movement scope regardless of detection effectiveness. If network segments are isolated such that a compromised workstation cannot directly connect to production servers, domain controllers, or backup infrastructure, an attacker must compromise each segmentation boundary separately — generating additional detection opportunities and limiting the blast radius of any single compromise. Most mid-market organizations have flat network architectures that provide no lateral movement resistance once initial access is achieved.

For PE operating partners assessing portco security, the lateral movement question is: if an attacker compromises a single endpoint today, how far can they move before hitting a segmentation control? In most mid-market environments, the honest answer is: all the way to the domain controller, unimpeded.

4.5 Hours

The median time for ransomware actors to reach Active Directory domain controllers after initial access, according to CrowdStrike's 2024 threat report. Once domain controllers are compromised, full environment encryption typically follows within hours. Lateral movement detection must operate on a sub-hour timeline to be effective.