Stopping Lateral Movement Means Identifying the Small Hops That Take Attackers Far

Today's attackers rarely conduct lateral movement manually.
For attackers, lateral movement is an exercise in taking what they are given: They are not moving throughout the network according to some sort of preplanned map, but following open pathways wherever they may lead. Rather than taking significant leaps into the heart of the network, attackers will make small hops, following open pathways to infiltrate any area of the network available to them.
As a result, today's attackers almost always use automated processes to conduct this type of reconnaissance.
If the automated process recognizes a key piece of infrastructure during one of these small hops, it will report back to the attacker to let them know something potentially valuable has been identified.
Ultimately, the goal is to hit every device in the enterprise - after all, the more devices an attacker captures, the greater the odds of finding something valuable.
Since most attacks today involve ransomware, data theft, or both, access to large volumes of data to steal or encrypt is critical.
Attackers don't move laterally just for the heck of it - they're doing it with a goal in mind.
In the beginning, that goal may be to simply compromise as many devices or areas of the network as possible, but as attack activity progresses, defenders can begin to look for evidence of intent.
This is just one example, but it's indicative of the sort of activity that often accompanies lateral movement through a network.
Some security solutions won't alert on encryption if only a small number of files are affected, and as a result, attackers have caught onto the fact that if they encrypt only a small amount of information at a time, they can often escape detection.
What's more likely is that the employee is engaging in fraudulent activity, or that their identity has been compromised and is being used by an attacker.
Monitoring for encryption is one of the most effective ways to identify an adversary moving laterally through the system and engaging in small attack activities as they go.
If the same anomalous activity is observed on multiple devices - especially if it is within a relatively short window of time - that's a good indicator that attackers are moving laterally from endpoint to endpoint.
When the automated processes engaging in lateral movement find something noteworthy, they send that data back out to the attacker.
If something within the network is sending the same type of data burst from several different endpoints - and it's not coming from a known and approved application - that should raise a red flag.
Certain small hops might not set off alarm bells on their own, but if they're happening too frequently the security team needs to be alerted.
Breach and attack simulation solutions and automated red teaming can imitate the tools and tactics that attackers favor to see whether security solutions are functioning properly - and if they are not, they may be able to recommend ways to improve them.
Even attackers are no longer manually conducting their incursions, instead opting to use tools that allow them to make countless small hops designed specifically to avoid detection.
Security teams have neither the time nor the resources to manually comb through hundreds of pages of network logs to look for this activity themselves - they need solutions in place that can provide them with real-time alerts when an attacker begins engaging with multiple devices, encrypting information, exfiltrating data, or any of a thousand other micro-activities.
Given the volume of activity on today's networks, abnormal behavior can sometimes be lost in the background noise, but a well-calibrated - and well-tested - SIEM that can draw conclusions based on massive amounts of input can make sure defenders have the information they need stop adversaries before they can escalate their attacks.


This Cyber News was published on securityboulevard.com. Publication date: Wed, 13 Dec 2023 16:13:18 +0000


Cyber News related to Stopping Lateral Movement Means Identifying the Small Hops That Take Attackers Far

Stopping Lateral Movement Means Identifying the Small Hops That Take Attackers Far - Today's attackers rarely conduct lateral movement manually. For attackers, lateral movement is an exercise in taking what they are given: They are not moving throughout the network according to some sort of preplanned map, but following open pathways ...
1 year ago Securityboulevard.com
Cybersecurity Training for Small Businesses - The importance of cybersecurity training for small businesses cannot be overstated in today's increasingly digital world. In conclusion, cybersecurity training is essential for small businesses to protect themselves against cyber threats. There are ...
1 year ago Securityzap.com
Australian SMBs Faces Challenges in Cyber Security - The internet has turned into a challenge for small to midsize businesses based in Australia. As 60% of SMBs close following a breach, companies that are breached are likely to fail later. According to a recent report by ASIC, 'medium to large' ...
1 year ago Cysecurity.news
New Cryptojacking Attack Targets Docker API to Create Malicious Swarm Botnet - On vulnerable endpoints, the Docker API is used to spawn an Alpine container and then retrieve an initialization shell script (init.sh) from a remote server ("solscan[.]live") that, in turn, checks if it's running as the root user and tools like curl ...
8 months ago Thehackernews.com
Cyber Insights 2023: ICS and Operational Technology - The result is more than a dozen features on subjects ranging from AI, quantum encryption, and attack surface management to venture capital, regulations, and criminal gangs. At the same time, ICS/OT is facing an expanding attack surface caused by ...
2 years ago Securityweek.com
Zcaler ThreatLabz 2024 VPN Risk Report - The growing sophistication of cyberthreats alongside the expansion of remote workforces and cloud technologies have exposed significant vulnerabilities in VPNs. Due to their legacy architecture, VPNs grant overly broad network access once credentials ...
1 year ago Cybersecurity-insiders.com
Hackers Using Windows Remote Management to Stealthily Navigate Active Directory Network - Once attackers obtain valid credentials, often through phishing, credential dumping, or brute-force attacks, they can use WinRM to execute arbitrary commands or scripts on other systems within the AD domain. Organizations are urged to restrict WinRM ...
1 month ago Cybersecuritynews.com
Scattered Spider Hops Nimbly From Cloud to On-Prem in Complex Attack - The group behind the high-profile MGM cyberattack in September has resurfaced in yet another sophisticated ransomware attack, in which the actor pivoted from a third-party service environment to the target organization's on-premise network in only an ...
1 year ago Darkreading.com Scattered Spider
How to Track Advanced Persistent Threats (APT) Using Threat Intelligence Lookup Tool - – Exploitation of zero-day vulnerabilities or watering hole attacks (compromising websites frequented by the target).Establishing a Foothold– Attackers deploy malware to create backdoors or tunnels for undetected movement within the ...
4 months ago Cybersecuritynews.com APT41
Hackers Abuse COM Objects for Fileless Malware Lateral Movements - This technique, detailed in research from March 2025, leverages legitimate Windows functionality to establish persistence and evade traditional security controls, marking a significant evolution in attack methodologies. The technique allows trapped ...
2 months ago Cybersecuritynews.com
CVE-2024-47730 - In the Linux kernel, the following vulnerability has been resolved: crypto: hisilicon/qm - inject error before stopping queue The master ooo cannot be completely closed when the accelerator core reports memory error. Therefore, the driver needs to ...
8 months ago Tenable.com
Scattered Spider Hops Nimbly From Cloud to On-Prem in Complex Attack - The group behind the high-profile MGM cyberattack in September has resurfaced in yet another sophisticated ransomware attack, in which the actor pivoted from a third-party service environment to the target organization's on-premise network in only an ...
1 year ago Darkreading.com Scattered Spider
Verizon DBIR Report - Small Businesses Emerges as Prime Targets for Ransomware Attacks - For small businesses with limited resources, focusing on these fundamental security controls represents the most effective defense against the rising tide of ransomware attacks. The attack methodology reveals a sophisticated understanding of small ...
2 months ago Cybersecuritynews.com
Network Security Priorities For Containers, According To Today's IT Pros - As enterprises and small businesses increasingly use containers and distributed applications, threat actors are becoming increasingly sophisticated. Recently disclosed security flaws discovered in Kubernetes could have been exploited to achieve ...
1 year ago Cybersecurity-insiders.com
ESET Small Business Security offers protection against online fraud, data theft and human error - ESET introduced ESET Small Business Security, which has been specifically designed to meet the cybersecurity needs of Small Office/Home Office business owners. According to the Small Business Administration, out of the 33.3 million small businesses ...
1 year ago Helpnetsecurity.com
Beyond DLP: Embracing a Multi-Layered Strategy for Personal Data Security - Data, especially personal data, drives the digital world. While digital systems continuously gather and use personal data to enhance user experience, there is a significant issue. The alarming frequency of data breaches indicates that the methods ...
1 year ago Securityboulevard.com
Approaching Complex Data Security for Small Businesses - Small businesses are faced with unique challenges in terms of data security. You must understand not only the risks but also the proactive measures you can take to protect your company's digital assets, which include everything from proprietary ...
1 year ago Hackread.com
Executing Zero Trust in the Cloud Takes Strategy - Zero trust is a high-level strategy that assumes that individuals, devices, and services attempting to access company resources, both externally and internally, can't automatically be trusted. Digital transformation, embracing of SaaS, remote work, ...
1 year ago Darkreading.com
Three Years After January 6th: The Insurrection's Impact on U.S. Democracy - Three years ago, on January 6, 2021, the U.S. Capitol was stormed by a mob intent on overturning the results of the 2020 Presidential Election. This event - the January 6th insurrection - was a direct attack on the democratic process and the peaceful ...
1 year ago Securityboulevard.com
CISA: Threat Actor Breached Federal Systems via Adobe ColdFusion Flaw - An unidentified threat actor or threat actors gained access to two public facing Web servers at a US federal government agency earlier this year by exploiting a critical but previously patched vulnerability in Adobe ColdFusion. The intrusions appear ...
1 year ago Darkreading.com CVE-2023-26360 CVE-2023-26359
UAC-0212 Hackers Launching Destructive Attack Targeting Critical Infrastructure - A sophisticated threat cluster tracked as UAC-0212 has escalated efforts to compromise critical infrastructure systems in Ukraine, according to a recent advisory from CERT-UA (Government Computer Emergency Response Team of Ukraine). Computer ...
4 months ago Cybersecuritynews.com CVE-2024-382
Microsoft Defender will isolate undiscovered endpoints to block attacks - Since June 2022, Defender for Endpoint has also been able to isolate hacked and unmanaged Windows devices, blocking all communication to and from the compromised devices to stop attackers from spreading through victims' networks. Microsoft also ...
2 months ago Bleepingcomputer.com
CISA Issues Urgent Warning Over Five Actively Exploited Windows 0-Day Vulnerabilities - CISA has issued an urgent alert after adding five new Microsoft Windows zero-day vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. Security experts warn that these ...
1 month ago Cybersecuritynews.com
Microsoft Warns of Ransomware Exploiting Cloud Environments with New Techniques - Microsoft Threat Intelligence researchers identified threat actor Storm-0501 utilizing enhanced capabilities for lateral movement from on-premises systems to cloud infrastructure. Storm-0501’s cloud compromise methodology begins with lateral ...
2 months ago Cybersecuritynews.com Black Basta Qilin
BadPilot Attacking Network Devices To Expand Russian Seashell Blizzard's Attacks - Microsoft Threat Intelligence analysts noted that Seashell Blizzard is known for its expertise in targeting critical infrastructure such as industrial control systems (ICS) and supervisory control and data acquisition systems (SCADA). These exploits ...
4 months ago Cybersecuritynews.com