背疼挂什么科| 西红柿什么时候吃最好| 樱桃什么时候成熟| 琉璃和玻璃有什么区别| 大是大非是什么意思| 哮喘病应该注意什么| 薄荷叶晒干后能干什么| 火靠念什么| 奢望是什么意思| 红参和人参有什么区别| 血糖高挂什么科| 痰是绿色的是什么原因| 什么的帽子| 睡意是什么意思| 嘴唇淡紫色是什么原因| 冰火两重天什么意思| 一个鸟一个木念什么| 月经周期短是什么原因| 一什么面包| 犯了痔疮为什么老放屁| 梦到借钱给别人什么意思| 宫颈糜烂有什么症状| 红颜薄命的意思是什么| 无以回报是什么意思| 水煎服是什么意思| ojbk 是什么意思| 右眼睛跳是什么预兆| 阴虚火旺有什么症状| 载脂蛋白b偏高是什么意思| 膝盖疼痛什么原因| 什么材质| 血红蛋白浓度是什么意思| 化石是什么| 妇科做活检是什么意思| 五月份什么星座| 理工男是什么意思啊| 眼睑浮肿是什么原因| 中耳炎挂什么科| 菩提子是什么材质| 尼龙属于什么材料| 火鸡面是什么| 弄璋之喜是什么意思| 拉肚子喝什么药| 敏感什么意思| 花生和什么不能一起吃| 在什么位置| 自来水养鱼为什么会死| 红曲是什么| 什么运动使人脸部年轻| 山药和什么搭配最好| 男属鸡的和什么属相最配| 吃什么能拉肚子| 赛脸什么意思| 带牙套是什么意思| 6月14号什么星座| 睡眠不足会引起什么症状| 微信限额是什么意思| 卡介苗什么时候接种| 隽字五行属什么| 过敏性紫癜是什么症状| 感冒吃什么药| 氨纶是什么面料优缺点| 什么叫肾病综合征| 儿童咳嗽吃什么药管用| ck是什么牌子的包包| 帝王是什么意思| 办理生育津贴需要什么资料| 母亲节送什么礼物好| 胃胀气是什么原因| 自投罗网是什么意思| 1969属什么| 知行合一什么意思| 来姨妈吃什么水果好| 土家族是什么族| 什么样的充电宝能带上飞机| 闫和阎有什么区别| 粿条是什么| 吃护肝片有什么副作用| 什么叫飘窗| 什么样的充电宝不能带上飞机| 168红包代表什么意思| 早上手肿胀是什么原因| 儿童拉肚子吃什么药| 什么情况下会感染hpv病毒| 晚上睡觉手麻是什么原因| 用什么梳子梳头发最好| 违和感是什么意思| 天秤座是什么象| 吃什么降血压效果最好| 荨麻疹可以吃什么水果| 代谢慢是什么原因| 弱精吃什么能提高活力| 沙棘不能和什么一起吃| lot是什么意思| 幽门螺杆菌阳性什么意思| 骇人是什么意思| 尿检阳性是什么意思| 喝中药可以吃什么水果| 休克是什么| 太白金星是什么神| 三个马读什么| 爱出汗是什么原因女人| 什么鱼清蒸好吃| 为什么会得乙肝| 做梦吃酒席什么预兆| 社恐的人适合什么工作| 什么的辨认| 奶豆腐是什么| 孕妇血压低吃什么能补上来| 五心烦热吃什么药最快| 2016年是什么生肖| 肝囊性灶是什么意思| 云南什么族| 怨天尤人是什么意思| 胃胀气吃什么药见效快| 花胶是什么鱼的鱼肚| 农历10月是什么月| 猫咪的胡须有什么作用| 含金量什么意思| 黄体酮低吃什么补得快| 尿白细胞阳性是什么意思| rr过高是什么意思| 什么的葡萄| 什么季节补钙效果最好| 检查尿酸挂什么科| 耳朵突然听不见是什么原因| 四月四号是什么星座| 贵州有什么美食| 后背有痣代表什么| 经常手麻是什么原因引起的| 跟风是什么意思| 盆腔炎用什么药好| 什么是熬夜| 黄金豆是什么豆| 王字旁加己念什么| wtf是什么意思| 鸭胗是什么器官| amazon是什么意思| 太上老君的坐骑是什么| 邪魅一笑是什么意思| 受凉肚子疼吃什么药| 肠胃紊乱吃什么药| 丝瓜不能和什么食物一起吃| 打鸡血是什么意思| 刍狗是什么意思| 今天过生日是什么星座| 8月29号是什么日子| 苍蝇最怕什么| 1.17是什么星座| 果实属于什么器官| 蜘蛛侠叫什么| 六六大顺是什么生肖| 一个令一个瓦念什么| 宗人府是什么地方| 小动脉瘤是什么意思| 多吃西瓜有什么好处| 狗狗窝咳吃什么药最好| 青黛色是什么颜色| 胯疼是什么原因| 西岳什么山| 秦始皇叫什么名字| 两个束念什么| 低压偏高是什么原因| 什么是人乳头瘤病毒| 心率低40多吃什么药| 什么时候可以查高考成绩| 蚕长什么样| 送男人什么礼物最难忘| 柠檬酸是什么东西| 做梦剪头发是什么意思| 怙恃是什么意思| 内在美是什么意思| 不加要是什么字| 练八段锦有什么好处| 为什么尿黄| 肩袖损伤吃什么药| 红色裤子搭配什么颜色上衣| 小孩呕吐是什么原因| 30岁属什么的生肖| 尿检ph值偏高说明什么| 鲻鱼是什么鱼| 宫崎骏是什么意思| 鼻子两侧毛孔粗大是什么原因造成的| dha是什么东西| 治癜风擦什么药好的快| 为什么这么热| 岁月不饶人是什么意思| 津液亏虚是什么意思| 吃播为什么吃不胖| 争宠是什么意思| 在屋顶唱着你的歌是什么歌| 桃子不能和什么一起吃| 利妥昔单抗是治什么病| 布洛芬什么时候吃| 肋骨骨折挂什么科| 5月出生是什么星座| 苹果是什么| 大人是什么意思| 心里堵得慌是什么原因| 狂野是什么意思| 什么是代孕| 雪人是什么生肖| 大学挂科是什么意思| 序列是什么意思| 什么的叫| 吃什么可以补精子| 梦见弟弟是什么意思| 屈光和近视有什么区别| 感冒咳嗽吃什么药止咳效果好| 什么是跨境电商| 5月7日是什么星座| 春晓的晓是什么意思| 喝红酒对身体有什么好处| 睾丸痛吃什么消炎药| 甘油三酯低有什么危害| 银饰发黑是什么原因| 五月一号什么星座| 5s是什么意思| 疣是一种什么病| 蒲公英泡水喝有什么好处| 鸡爪煲汤放什么材料| 有湿热吃什么中成药| 月经不来挂什么科| 脱头发严重是什么原因引起的| 蓝色妖姬的花语是什么| 狗狗有什么品种| 吃席是什么意思| 口干舌燥吃什么药| 维生素d3什么时候吃最好| 肝钙化是什么意思| 喷的右边念什么| 4月4日什么星座| 支原体吃什么药| 梨形心见于什么病| 恶心反胃吃什么药| 苦瓜干泡水喝有什么功效| 乳糖不耐受可以喝什么奶| 瞳孔缩小意味着什么| 凌晨是什么时辰| mic是什么单位| 牙疼吃什么药效果最好| 脱发厉害是什么原因引起的| 银灰色五行属什么| 检查肝做什么检查| 舌尖麻是什么原因| 扬长避短什么意思| 雌激素过高是什么原因造成的| 荨麻疹不能吃什么食物| bm是什么牌子| 过敏嘴唇肿是什么原因| 短发女人吸引什么男人| 白麝香是什么味道| 坐飞机要什么证件| 胎位roa是什么意思| 停月经有什么症状| 颠是什么意思| 肺与大肠相表里是什么意思| 白头发缺什么维生素| 揾什么意思| 胃反酸水是什么原因| 江苏有什么烟| 远香近臭是什么意思| 长脓包是什么原因| mice是什么意思| 百度

黑龙江首届群众骑行活动

百度     北青报记者在解读中看到,其实第四十六条并不算是“新规”。

Lateral movement is how attackers spread across multiple parts of a network.

Learning Objectives

After reading this article you will be able to:

  • Define lateral movement
  • Describe how lateral movement occurs
  • List preventative measures to slow or halt lateral movement

Related Content


Want to keep learning?

Subscribe to theNET, Cloudflare's monthly recap of the Internet's most popular insights!

Refer to Cloudflare's Privacy Policy to learn how we collect and process your personal data.

Copy article link

What is lateral movement?

In network security, lateral movement is the process by which attackers spread from an entry point to the rest of the network. There are many methods by which they can achieve this. For instance, an attack could start with malware on an employee's desktop computer. From there, the attacker attempts to move laterally to infect other computers on the network, to infect internal servers, and so on until they reach their final target.

Diagram of lateral movement. Attacker infects laptop, enters secure network, moves laterally to other computers and servers.

Attackers aim to move laterally undetected. But even if an infection is discovered on the initial device, or if their activities are detected, the attacker can maintain their presence within the network if they have infected a wide range of devices.

Imagine a group of burglars who enter a house through an open window, then each go to a different room in the house. Even if a single burglar is discovered in one room, the others can continue stealing items. Similarly, lateral movement enables an attacker to enter the various "rooms" of a network — servers, endpoints, application access — making the attack difficult to contain.

While some aspects of it may be automated, lateral movement is often a manual process directed by an attacker or group of attackers. This hands-on approach enables attackers to tailor their methods to the network in question. It also allows them to respond quickly to security countermeasures applied by network and security administrators.

How does lateral movement happen?

Lateral movement starts with an initial entry point into the network. This entry point could be a malware-infected machine that connects to the network, a stolen set of user credentials (username and password), a vulnerability exploit via a server's open port, or a number of other attack methods.

Typically, the attacker establishes a connection between the entry point and their command-and-control (C&C) server. Their C&C server issues commands to any installed malware and stores collected data from malware-infected or remotely controlled devices.

Once the attacker has a foothold on a device inside the network, they perform reconnaissance. They find out as much as they can about the network, including what the compromised device has access to and, if they have compromised a user's account, what privileges the user has.

The next step for the attacker to begin moving laterally is a process called "privilege escalation."

Privilege escalation

Privilege escalation is when a user (whether legitimate or illegitimate) gains more privileges than they should have. Privilege escalation sometimes occurs accidentally in identity and access management (IAM) when user privileges are not tracked and assigned correctly. By contrast, attackers purposefully exploit flaws in systems to escalate their privileges on a network.

If they entered a network through a vulnerability or malware infection, attackers may use a keylogger (which tracks the keys users type) to steal user credentials. Or they may have entered a network initially through stealing credentials in a phishing attack. However they get it, attackers start with one set of credentials and the privileges associated with that user account. They aim to maximize what they can do with that account, then they spread to other machines and use credential theft tools to take over other accounts as they go.

To get the kind of access needed to cause maximum damage or reach their target, the attacker usually needs administrator-level privileges. They therefore move laterally through the network until they acquire administrator credentials. Once these credentials are obtained, this essentially gives them control over the entire network.

Camouflage and countermeasures during lateral movement

Throughout the process of moving laterally, the attacker is likely paying close attention to countermeasures from the organization's security team. For example, if the organization discovers a malware infection on a server and cuts that server off from the rest of the network to quarantine the infection, the attacker may wait for some time before performing further actions so that their presence is not detected on additional devices.

Attackers may install backdoors to ensure they can re-enter the network if their presence is detected and successfully removed from all endpoints and servers. (A backdoor is a secret way into an otherwise secure system.)

Attackers also attempt to blend in their activities with normal network traffic, since unusual network traffic may alert administrators to their presence. Blending in becomes easier as they compromise additional legitimate user accounts.

What types of attacks use lateral movement?

Many categories of attacks rely on lateral movement to either reach as many devices as possible or to travel throughout the network until a specific goal is reached. Some of these attack types include:

  • Ransomware: Ransomware attackers aim to infect as many devices as possible to ensure they have maximum leverage for demanding a ransom payment. In particular, ransomware targets internal servers that contain crucial data for an organization's everyday processes. This guarantees that, once activated, the ransomware infection will heavily damage the organization's operations, at least temporarily.
  • Data exfiltration: Data exfiltration is the process of moving or copying data out of a controlled environment without authorization. Attackers exfiltrate data for a number of reasons: to steal intellectual property, to obtain personal data for carrying out identity theft, or to hold the data they steal for ransom, as in a doxware attack or certain types of ransomware attacks. Attackers usually need to move laterally from an initial point of compromise to reach the data they want.
  • Espionage: Nation-states, organized cyber crime groups, or rival corporations may all have their reasons for monitoring activities within an organization. If the goal of an attack is espionage rather than pure financial gain, the attackers will try to stay undetected and embedded in the network for as long as possible. This contrasts with ransomware attacks, in which the attacker eventually wishes to draw attention to their actions in order to receive a ransom. It also differs from data exfiltration, in which the attacker may not care if they are detected once they get the data they were after.
  • Botnet infection: Attackers may add the devices they take over to a botnet. Botnets can be used for a variety of malicious purposes; in particular they are commonly used in distributed denial-of-service (DDoS) attacks. Lateral movement helps an attacker add as many devices as possible to their botnet, making it more powerful.

How to stop lateral movement

These preventative measures can make lateral movement much more difficult for attackers:

Penetration testing can help organizations close up vulnerable parts of the network that could allow lateral movement. In penetration testing, an organization hires an ethical hacker to stress-test their security by trying to penetrate as deep into the network as possible while remaining undetected. The hacker then shares their findings with the organization, which can use this information to fix the security holes that the hacker exploited.

Zero Trust security is a network security philosophy that does not trust any user, device, or connection by default. A Zero Trust network assumes that all users and devices present a threat and continually re-authenticates both users and devices. Zero Trust also uses a least-privilege approach to access control and divides networks into small segments. These strategies make privilege escalation much more difficult for attackers and make detecting and quarantining the initial infection much easier for security administrators.

Endpoint security involves scanning endpoint devices (desktop computers, laptops, smartphones, etc.) regularly with anti-malware software, among other security technologies.

IAM is a crucial component of preventing lateral movement. User privileges have to be closely managed: if users have more privileges than they strictly need, the consequences of an account takeover become more serious. Additionally, using two-factor authentication (2FA) can help stop lateral movement. In a system that uses 2FA, obtaining user credentials is not enough for an attacker to compromise an account; the attacker needs to steal the secondary authentication token as well, which is far more difficult.

Cloudflare One combines networking services with Zero Trust security services. It integrates with identity management and endpoint security solutions in order to replace a patchwork of security products with a single platform that prevents lateral movement and other attacks. Learn more about Cloudflare One and other network security solutions.

疏通血管吃什么药最好 睾丸扭转是什么意思 俄罗斯乌克兰为什么打仗 深千尺是什么意思 右下腹是什么器官
越描越黑是什么意思 吃东西就打嗝是什么原因 经期同房需要注意什么 家家酒是什么意思 掉头发是什么原因引起的
桑黄是什么东西 乐子是什么意思 台湾高山茶属于什么茶 蒙古族不吃什么肉 鲤鱼喜欢吃什么食物
母胎单身什么意思 上曼月乐环后要注意什么 33岁属什么 20点是什么时辰 40年是什么婚姻
西辽国在现今什么地方hcv8jop3ns6r.cn 儿童口腔疱疹吃什么药hcv7jop9ns7r.cn 杆菌一个加号什么意思hcv9jop8ns1r.cn 鲫鱼喜欢吃什么hcv8jop4ns0r.cn 西皮是什么皮hcv9jop2ns4r.cn
解暑喝什么hcv9jop8ns0r.cn 昭字五行属什么hcv9jop8ns1r.cn 运动系统由什么组成hcv7jop5ns1r.cn 膝盖发热是什么原因kuyehao.com 电子烟有什么危害hcv7jop4ns5r.cn
o型血吃什么瘦的最快hcv9jop4ns0r.cn 浮生如梦是什么意思hcv8jop3ns8r.cn 吃什么减肚子上的赘肉最快hcv7jop6ns6r.cn 吃什么会变瘦cj623037.com 一什么黑影hcv7jop6ns6r.cn
金銮殿是什么意思hcv8jop4ns0r.cn 词讼是什么意思hcv8jop4ns7r.cn 氧化钠是什么hcv9jop1ns2r.cn 正方形体积公式是什么hcv8jop4ns3r.cn 什么样的轮子只转不走hcv9jop3ns5r.cn
百度