EXPLAINER | SECURITY CONCEPTS
Active Threat9 min read

What is Lateral Movement in Cybersecurity? Techniques and Detection

79 min
Average attacker breakout time from initial access to lateral movement in 2024
60%
Of intrusions involve Active Directory as a lateral movement pathway
T1078
Valid accounts is the most commonly observed lateral movement technique
62%
Of lateral movement activity uses legitimate admin tools to avoid detection

Lateral movement is the phase of a cyberattack during which an adversary moves from their initial foothold to other systems in the network. It is one of the most consequential phases of an intrusion: the attacker arrived via a phishing email or a vulnerable web application, but their target is the domain controller, the backup infrastructure, the finance system, or the data warehouse. Lateral movement is how they get there.

MITRE ATT&CK categorizes lateral movement as a distinct tactic (TA0008) with 17 documented techniques. In practice, lateral movement almost always combines credential theft (obtaining valid credentials from one system) with authentication abuse (using those credentials to access another system). Understanding which techniques attackers favor, why they are hard to detect, and what controls constrain them is essential knowledge for any security practitioner.

Free daily briefing

Briefings like this, every morning before 9am.

Threat intel, active CVEs, and campaign alerts — distilled for practitioners. 50,000+ subscribers. No noise.

Common Lateral Movement Techniques

Pass the Hash (T1550.002) exploits NTLM authentication to move laterally without knowing the plaintext password. An attacker who has dumped the NTLM hash of a local administrator account from one Windows system can use that hash directly to authenticate to other Windows systems where the same local admin account exists. PsExec, CrackMapExec, and Impacket's wmiexec are the tools most commonly used to operationalize this technique. Disabling NTLM where possible and enforcing Local Administrator Password Solution (LAPS) to ensure unique local admin passwords per host mitigates this significantly.

Pass the Ticket (T1550.003) abuses Kerberos by stealing Kerberos ticket-granting service (TGS) tickets from memory and using them to authenticate to services without knowing the account password. The related technique, Kerberoasting (T1558.003), requests TGS tickets for service accounts and cracks them offline, since service account passwords are often weak and rarely rotated.

RDP (T1021.001) remains one of the most common lateral movement vectors in real-world incidents. Attackers with valid credentials use Remote Desktop Protocol to log into systems interactively. RDP sessions are harder to detect as malicious because they produce the same authentication events as legitimate administrator access.

WMI and PsExec (T1047, T1569.002) allow remote command execution using legitimate Windows management protocols. These techniques are classified as living-off-the-land because they use built-in Windows functionality, making behavioral detection dependent on context (who is executing, from where, to which systems) rather than tool signatures.

Why Lateral Movement Is Hard to Detect

The fundamental challenge of detecting lateral movement is that the most effective techniques use legitimate credentials and legitimate tools. An attacker who has compromised a domain admin account and uses it to RDP to the domain controller is performing the same action as a real domain admin performing their legitimate duties.

Detecting this requires behavioral context: Is this account logging into systems it has never accessed before? Is this access happening at an unusual time? Did an authentication event immediately follow an anomalous process execution on the source system? These questions require behavioral baselines, cross-source correlation across endpoint, identity, and network logs, and the analyst judgment to distinguish genuine administrative activity from attacker impersonation.

Alert fatigue compounds the problem. In environments where IT administrators legitimately use PsExec and WMI, rule-based detection fires constantly on legitimate activity, training analysts to dismiss those alert types. Attackers exploit this directly by using the same tools as administrators.

Detection Strategies

The most effective lateral movement detection combines identity analytics, endpoint telemetry, and network segmentation logging.

Identity analytics: configure your SIEM or UEBA platform to alert on authentication patterns that deviate from established baselines. Logon to a large number of distinct systems in a short window, authentication to systems a user has never accessed before, and service account authentications outside scheduled job windows are high-signal lateral movement indicators.

Endpoint process telemetry: EDR process-tree visibility reveals the parent process that spawned a remote connection attempt. A cmd.exe spawned from WMI on a workstation that then initiates an authentication to a domain controller is a suspicious process chain that SIEM correlation rules can catch if parent-process telemetry is available.

Honeypot accounts and credentials: place accounts in Active Directory that have no legitimate use. Any authentication attempt against a honeypot account is a high-confidence lateral movement indicator with near-zero false-positive rate.

Network segmentation logging: if microsegmentation is in place, east-west firewall logs will capture lateral movement attempts between segments. Attempts to connect from a workstation to a domain controller on admin ports (WMI port 135/445, RDP 3389) outside a defined maintenance window are high-signal events.

Controls That Limit Lateral Movement

Prevention and containment are more achievable than zero-false-positive detection.

Active Directory segmentation (tiered administration) separates domain admin accounts from accounts used for daily workstation access. A credential compromised from a developer's laptop cannot be used to access domain controllers if the developer account has no rights to AD Tier 0 assets.

Local Administrator Password Solution (LAPS) ensures unique, randomly generated local administrator passwords per endpoint, eliminating pass-the-hash propagation across machines sharing a common local admin credential.

Cred Guard and Protected Users security group prevent credential material from being stored in LSASS memory in extractable form, blocking the memory dump techniques that feed most lateral movement.

Network segmentation restricts which systems can reach which other systems on sensitive protocols. Workstations should not be able to initiate SMB or RDP connections to domain controllers except from specific jump hosts. Segmentation does not prevent lateral movement but forces attackers to take routes that are more visible.

Subscribe to unlock Remediation & Mitigation steps

Free subscribers unlock full IOC lists, remediation steps, and every daily briefing.

The bottom line

Lateral movement is the phase where attacker success is most commonly determined. Initial access is often unavoidable; the question is whether the attacker can reach their target after arriving. Tiered AD administration, LAPS, Credential Guard, and network segmentation are the structural controls. Identity behavioral analytics and EDR process telemetry are the detection mechanisms. Together they compress attacker breakout time from hours to minutes and surface intrusions while the blast radius is still limited.

Frequently asked questions

What is the difference between lateral movement and privilege escalation?

Privilege escalation is about gaining higher-level permissions on a single system: going from a standard user to local administrator, or from local administrator to SYSTEM. Lateral movement is about moving to a different system using obtained credentials or access tokens. In practice the two are interleaved: an attacker escalates privileges on System A to extract credentials, then uses those credentials for lateral movement to System B, then escalates again on System B.

What is Kerberoasting and how does it enable lateral movement?

Kerberoasting (T1558.003) targets Kerberos service account tickets. An attacker with any valid domain user account can request TGS (Ticket Granting Service) tickets for any service principal name registered in Active Directory. These tickets are encrypted with the service account's password hash and can be extracted and cracked offline using tools like Hashcat. If the service account has a weak password (common for legacy application service accounts), the password is recovered and used to authenticate to systems the service account can reach.

What is a golden ticket attack?

A golden ticket attack forges Kerberos TGT (Ticket Granting Ticket) tickets using the NTLM hash of the krbtgt account, the special Active Directory account whose password is used to sign all Kerberos tickets. An attacker with domain admin rights can dump the krbtgt hash and use it to create TGT tickets for any account in the domain, including nonexistent accounts, with any permissions and expiration date. Golden tickets persist even after the originally compromised account's password is reset. Mitigation requires resetting the krbtgt password twice (to invalidate all issued tickets) and replacing compromised systems.

How does network segmentation stop lateral movement?

Network segmentation does not prevent lateral movement between systems in the same segment but forces attackers to traverse firewall boundaries with explicit allow-list rules to reach high-value targets in other segments. By placing domain controllers, backup systems, and sensitive databases in isolated segments accessible only from specific jump hosts, defenders force lateral movement attempts through monitored chokepoints. The firewall deny logs from these chokepoints become high-signal detection sources: blocked connection attempts from unexpected sources to admin ports are reliable lateral movement indicators.

Sources & references

  1. MITRE ATT&CK Lateral Movement Techniques
  2. CrowdStrike Adversary Intelligence

Free resources

25
Free download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.

No spam. Unsubscribe anytime.

Free download

Ransomware Incident Response Playbook

Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

Daily Briefing

Get briefings like this every morning

Actionable threat intelligence for working practitioners. Free. No spam. Trusted by 50,000+ SOC analysts, CISOs, and security engineers.

Unsubscribe anytime.

Get tomorrow's threat briefing before your inbox does.