![logrhythm detectx logrhythm detectx](https://logrhythm.com/wp-content/uploads/2020/06/Graphic_Anatomy-of-a-Hacker-Group_-APT29-1-700x700.png)
The key to detecting techniques indicative of lateral movement is realizing that there’s more than one approach to identifying this type of activity. You can find the full list of lateral movement techniques and steps for mitigating each technique on MITRE’s website. These techniques highlight the various vulnerabilities and methods used to steal credentials and exploit remote services. The important thing to focus on within MITRE’s definition is that lateral movement is not a single technique, but instead a set of techniques that include advanced persistent threats (APTs) and areas of exploitation used by threat actors to gain access to their intended target.
#LOGRHYTHM DETECTX INSTALL#
Adversaries might install their own remote access tools to accomplish Lateral Movement or use legitimate credentials with native network and operating system tools, which may be stealthier.
![logrhythm detectx logrhythm detectx](https://logrhythm.com/wp-content/uploads/2020/05/uk-7-metrics-to-measure-the-effectiveness-of-your-soc-394x279.png)
Reaching their objective often involves pivoting through multiple systems and gaining access to accounts. Following through on their primary objective often requires exploring the network to find their target and subsequently gaining access to it.
![logrhythm detectx logrhythm detectx](https://logrhythm.com/wp-content/uploads/2020/08/Report-Thumbnail-543x700.jpg)
Lateral Movement consists of techniques that adversaries use to enter and control remote systems on a network. Let’s start with the definition MITRE ATT&CK™ provides for lateral movement: But what exactly is lateral movement? And how does it impact your organization’s security operations? What is Lateral Movement? You may have heard of the concept of lateral movement within the context of security operations and possess a general idea of how threat actors leverage this tactic to gain access to your data.