

From a business standpoint, lateral movement can be the turning point in an attack. It often determines whether a minor incident stays contained or if it escalates into a major incident with detrimental financial, legal, and reputational consequences.
In the examples above, you’ll see two common types of lateral movement that align with techniques in the MITRE ATT&CK Framework. For a full list of enterprise-level lateral movement techniques, visit the MITRE website.
Ransomware: MITRE TA0040
Adversary profile: From cyber crime organizations to low-skilled threat actors
Target profile: Every organization regardless of size and vertical
Purpose: Encrypt victim’s machines to extort ransom payment in exchange for restored data
Lateral movement’s role: Gain the ability to plant and execute ransomware payloads on as many machines as possible
Data Theft: MITRE TA0010
Adversary profile: Elite groups of either nation states/cyber crime organizations
Target profile: Large enterprises and nation states
Purpose: Theft of sensitive information such as intellectual property, Personal Identifiable Information (PII), and credit card data
Lateral movement’s role: Gain access to the servers or applications where this information is stored

Preventing Lateral Movement in Active Directory
Operational impact:
From a local threat to an organizational-level incident
Preventing Lateral Movement in Active Directory


Ransomware: MITRE TA0040
Adversary profile: From cyber crime organizations to low-skilled threat actors
Target profile: Every organization regardless of size and vertical
Purpose: Encrypt victim’s machines to extort ransom payment in exchange for restored data
Lateral movement’s role: Gain the ability to plant and execute ransomware payloads on as many machines as possible

Data Theft: MITRE TA0010
Adversary profile: Elite groups of either nation states/cyber crime organizations
Target profile: Large enterprises and nation states
Purpose: Theft of sensitive information such as intellectual property, Personal Identifiable Information (PII), and credit card data
Lateral movement’s role: Gain access to the servers or applications where this information is stored
From a business standpoint, lateral movement can be the turning point in an attack. It often determines whether a minor incident stays contained or if it escalates into a major incident with detrimental financial, legal, and reputational consequences.
In the examples above, you’ll see two common types of lateral movement that align with techniques in the MITRE ATT&CK Framework. For a full list of enterprise-level lateral movement techniques, visit the MITRE website.
Operational impact:
From a local threat to an organizational-level incident