{"id":119368,"date":"2025-08-07T16:26:06","date_gmt":"2025-08-07T08:26:06","guid":{"rendered":"https:\/\/version-2.com\/?p=119368"},"modified":"2025-08-07T16:28:10","modified_gmt":"2025-08-07T08:28:10","slug":"how-to-prevent-lateral-movement-the-most-overlooked-cyber-threat","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2025\/08\/how-to-prevent-lateral-movement-the-most-overlooked-cyber-threat\/","title":{"rendered":"How to prevent lateral movement\u2014the most overlooked cyber threat"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"119368\" class=\"elementor elementor-119368\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/content.nordlayer.com\/uploads\/How_to_how_to_prevent_lateral_movement_11a5aa5cf6.webp\" width=\"1400\" height=\"800\" \/><\/p><div class=\"Grid_item__b3BBG Grid_col9Lg__8Rrwm BlogArticle_contentGrid__cESsj\"><div class=\"Paper_lightPrimary__80ZBi\" data-testid=\"paper\" data-theme=\"light\">\u00a0<\/div><div class=\"BlogArticle_articleSummary__Orlgt\"><div class=\"ArticleSummary_markdownWrapper__Wj_mp\"><p class=\"Text_text___v2aO Markdown_paragraph__sc4Gl ArticleSummary_paragraph___u7mV Text_bodyColor__a4VTo\" data-testid=\"text\"><strong class=\"Markdown_strong__Rxk9v ArticleSummary_strong___vw_3\">Summary:<\/strong> Understand how lateral movement enables deep network compromise, the techniques behind it, and how to stop it.<\/p><\/div><\/div><div id=\"section-1\"><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">Even the most secure perimeter means little once an attacker is inside. That\u2019s where lateral movement begins, and understanding how to prevent lateral movement is a must.<\/p><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">While phishing attacks and endpoint breaches dominate headlines, <strong class=\"Markdown_strong__Rxk9v\">it&#8217;s the post-intrusion maneuvering<\/strong>\u2014when threat actors quietly escalate privileges, pivot across systems, and harvest credentials\u2014that often determines the true impact of a breach.<\/p><h2 id=\"lateral-movement-definition\" class=\"Heading_root__WNfE8 Heading_heading30__zsK4j Heading_primary__oRqei Heading_medium__JTPnX SharedArticleMarkdownComponents_heading__ZOvVm SharedArticleMarkdownComponents_heading2__1AkXN SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"heading\">Lateral movement definition<\/h2><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">Lateral movement refers to the <strong class=\"Markdown_strong__Rxk9v\">techniques cyber attackers use <em class=\"\">after<\/em> initial compromise to move deeper within a network<\/strong>, often with the goal of gaining access to high-value systems or data. Rather than striking immediately, bad actors exploit internal tools, credentials, and trust relationships to move stealthily between endpoints\u2014avoiding detection while gaining more access and control.<\/p><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">This phase of a cyber-attack is especially dangerous because <strong class=\"Markdown_strong__Rxk9v\">it unfolds <em class=\"\">inside<\/em> the network perimeter<\/strong>, where traditional defenses like <a class=\"Link_root__D2Mxm Link_inherit__j4LYr Link_medium__8LZIg SharedArticleMarkdownComponents_link__AVHkv\" href=\"https:\/\/nordlayer.com\/learn\/firewall\/what-is-firewall\/\">firewalls<\/a> and antivirus solutions offer limited visibility. Detecting lateral movement often requires a combination of behavioral analytics, <a class=\"Link_root__D2Mxm Link_inherit__j4LYr Link_medium__8LZIg SharedArticleMarkdownComponents_link__AVHkv\" href=\"https:\/\/nordlayer.com\/network-security\/access-control\/\">access control enforcement<\/a>, and visibility into how users and systems interact\u2014especially around privileged accounts and critical assets like the domain controller.<\/p><h2 id=\"the-attack-chain-how-lateral-movement-typically-unfolds\" class=\"Heading_root__WNfE8 Heading_heading30__zsK4j Heading_primary__oRqei Heading_medium__JTPnX SharedArticleMarkdownComponents_heading__ZOvVm SharedArticleMarkdownComponents_heading2__1AkXN SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"heading\">The attack chain: how lateral movement typically unfolds<\/h2><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">Lateral movement attacks don&#8217;t happen in a single step\u2014they unfold over a series of calculated moves designed to escalate access and maintain stealth. Here are the stages of lateral movement:<\/p><\/div><div id=\"section-2\"><div class=\"ArticleImage_root__KtuDJ BlogArticle_articleImage__qw2Gm\"><img decoding=\"async\" class=\"ArticleImage_image__L_45g\" src=\"https:\/\/content.nordlayer.com\/uploads\/The_stages_of_a_lateral_movement_attack_48642b2ab2.webp\" sizes=\"(max-width: 500px) 500px, (max-width: 750px) 750px, (max-width: 1000px) 1000px, 100vw\" srcset=\"https:\/\/content.nordlayer.com\/uploads\/large_The_stages_of_a_lateral_movement_attack_48642b2ab2.webp 1000w, https:\/\/content.nordlayer.com\/uploads\/small_The_stages_of_a_lateral_movement_attack_48642b2ab2.webp 500w, https:\/\/content.nordlayer.com\/uploads\/medium_The_stages_of_a_lateral_movement_attack_48642b2ab2.webp 750w, https:\/\/content.nordlayer.com\/uploads\/The_stages_of_a_lateral_movement_attack_48642b2ab2.webp\" alt=\"Infographic titled &quot;The stages of a lateral movement attack&quot; \" \/><\/div><\/div><div id=\"section-3\"><h3 class=\"Heading_root__WNfE8 Heading_heading20__nWkNG Heading_primary__oRqei Heading_medium__JTPnX SharedArticleMarkdownComponents_heading__ZOvVm SharedArticleMarkdownComponents_heading3__usnTx SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"heading\">Stage 1: Initial access<\/h3><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">The attacker breaches the perimeter through methods like phishing attacks, exploiting remote services (e.g., <a class=\"Link_root__D2Mxm Link_inherit__j4LYr Link_medium__8LZIg SharedArticleMarkdownComponents_link__AVHkv\" href=\"https:\/\/nordlayer.com\/rdp\/\">RDP<\/a> or <a class=\"Link_root__D2Mxm Link_inherit__j4LYr Link_medium__8LZIg SharedArticleMarkdownComponents_link__AVHkv\" href=\"https:\/\/nordlayer.com\/learn\/vpn\/what-is-vpn\/\">VPN<\/a>), or targeting unpatched vulnerabilities. Once inside, attackers establish a foothold but remain limited in scope\u2014often landing on a low-privilege endpoint.<\/p><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\"><strong class=\"Markdown_strong__Rxk9v\">Common techniques:<\/strong> <a class=\"Link_root__D2Mxm Link_inherit__j4LYr Link_medium__8LZIg SharedArticleMarkdownComponents_link__AVHkv\" href=\"https:\/\/nordlayer.com\/learn\/threats\/phishing\/\">Phishing<\/a>, <a class=\"Link_root__D2Mxm Link_inherit__j4LYr Link_medium__8LZIg SharedArticleMarkdownComponents_link__AVHkv\" href=\"https:\/\/nordlayer.com\/learn\/threats\/brute-force-attack\/\">brute-force attacks<\/a>, vulnerable public-facing apps<br \/><strong class=\"Markdown_strong__Rxk9v\">Defensive response:<\/strong> Multi-factor authentication, endpoint detection, <a class=\"Link_root__D2Mxm Link_inherit__j4LYr Link_medium__8LZIg SharedArticleMarkdownComponents_link__AVHkv\" href=\"https:\/\/nordlayer.com\/learn\/access-control\/policy-and-template\/\">access control policies<\/a><\/p><h3 class=\"Heading_root__WNfE8 Heading_heading20__nWkNG Heading_primary__oRqei Heading_medium__JTPnX SharedArticleMarkdownComponents_heading__ZOvVm SharedArticleMarkdownComponents_heading3__usnTx SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"heading\">Stage 2: Reconnaissance and enumeration<\/h3><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">With a foothold established, the attacker begins mapping the internal environment. They collect information about user accounts, system architecture, network shares, and potential targets such as the domain controller or privileged accounts.<\/p><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\"><strong class=\"Markdown_strong__Rxk9v\">Common techniques:<\/strong> Netstat, PowerShell scripts, built-in OS tools<br \/><strong class=\"Markdown_strong__Rxk9v\">Defensive response:<\/strong> Least privilege enforcement, intrusion detection systems, user behaviour analytics<\/p><h3 class=\"Heading_root__WNfE8 Heading_heading20__nWkNG Heading_primary__oRqei Heading_medium__JTPnX SharedArticleMarkdownComponents_heading__ZOvVm SharedArticleMarkdownComponents_heading3__usnTx SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"heading\">Stage 3: Credential dumping and privilege escalation<\/h3><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">To move further, malicious actors seek elevated access. They use tools to dump credentials, exploit privilege escalation vulnerabilities, or abuse poorly protected password management systems to access accounts.<\/p><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\"><strong class=\"Markdown_strong__Rxk9v\">Common techniques:<\/strong> Mimikatz, token manipulation, credential reuse<br \/><strong class=\"Markdown_strong__Rxk9v\">Defensive response:<\/strong> Endpoint detection, <a class=\"Link_root__D2Mxm Link_inherit__j4LYr Link_medium__8LZIg SharedArticleMarkdownComponents_link__AVHkv\" href=\"https:\/\/nordpass.com\/blog\/best-way-to-store-passwords\/\" target=\"_blank\" rel=\"noopener noreferrer\">password management best practices<\/a>, privilege segmentation<\/p><h3 class=\"Heading_root__WNfE8 Heading_heading20__nWkNG Heading_primary__oRqei Heading_medium__JTPnX SharedArticleMarkdownComponents_heading__ZOvVm SharedArticleMarkdownComponents_heading3__usnTx SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"heading\">Stage 4: Lateral movement<\/h3><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">Now armed with valid credentials and internal knowledge, the cybercriminal begins accessing various systems in the network. They use lateral movement techniques, such as exploiting SMB, WMI, or <a class=\"Link_root__D2Mxm Link_inherit__j4LYr Link_medium__8LZIg SharedArticleMarkdownComponents_link__AVHkv\" href=\"https:\/\/nordlayer.com\/rdp\/\">remote desktop protocol (RDP)<\/a> to access additional machines and data.<\/p><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\"><strong class=\"Markdown_strong__Rxk9v\">Common techniques:<\/strong> Pass-the-Hash, Pass-the-Ticket, WMI, RDP, PsExec<br \/><strong class=\"Markdown_strong__Rxk9v\">Defensive response:<\/strong> <a class=\"Link_root__D2Mxm Link_inherit__j4LYr Link_medium__8LZIg SharedArticleMarkdownComponents_link__AVHkv\" href=\"https:\/\/nordlayer.com\/features\/network-segmentation\/\">Network segmentation<\/a>, monitor remote services, restrict internal movement with <a class=\"Link_root__D2Mxm Link_inherit__j4LYr Link_medium__8LZIg SharedArticleMarkdownComponents_link__AVHkv\" href=\"https:\/\/nordlayer.com\/zero-trust\/\">Zero Trust solutions<\/a><\/p><h3 class=\"Heading_root__WNfE8 Heading_heading20__nWkNG Heading_primary__oRqei Heading_medium__JTPnX SharedArticleMarkdownComponents_heading__ZOvVm SharedArticleMarkdownComponents_heading3__usnTx SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"heading\">Stage 5: Target acquisition and impact<\/h3><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">The final goal is usually exfiltration, encryption, or business disruption. The attacker reaches high-value assets (e.g., network controller, file servers, customer databases), and carries out their objective\u2014often undetected if lateral movement hasn\u2019t been flagged.<\/p><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\"><strong class=\"Markdown_strong__Rxk9v\">Common techniques<\/strong>: Data exfiltration, ransomware deployment, system sabotage<br \/><strong class=\"Markdown_strong__Rxk9v\">Defensive response<\/strong>: Threat detection via machine learning, monitoring of unusual activity, real-time response<\/p><h2 id=\"key-techniques-attackers-use-for-lateral-movement\" class=\"Heading_root__WNfE8 Heading_heading30__zsK4j Heading_primary__oRqei Heading_medium__JTPnX SharedArticleMarkdownComponents_heading__ZOvVm SharedArticleMarkdownComponents_heading2__1AkXN SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"heading\">Key techniques attackers use for lateral movement<\/h2><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">Once inside a network, bad actors rely on various lateral movement techniques to gain higher-level access and quietly move between systems. These methods often abuse legitimate tools and protocols, making them difficult to detect:<\/p><ul class=\"SharedArticleMarkdownComponents_list__7fmEv SharedArticleMarkdownComponents_horizontalSpacing__ayEp5 List_list__ysCsa\"><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div><strong class=\"Markdown_strong__Rxk9v\">Pass-the-Hash (PtH):<\/strong> Reuses hashed credentials captured from memory to authenticate on other systems without needing plaintext passwords.<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div><strong class=\"Markdown_strong__Rxk9v\">Pass-the-Ticket (PtT):<\/strong> Relies on Kerberos tickets (TGTs or service tickets) to access services across the domain.<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div><strong class=\"Markdown_strong__Rxk9v\">Remote Desktop Protocol (RDP):<\/strong> Uses remote services to gain access to other machines via legitimate remote desktop functionality.<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div><strong class=\"Markdown_strong__Rxk9v\">Windows Management Instrumentation (WMI):<\/strong> Executes commands and scripts remotely, often without triggering alerts.<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div><strong class=\"Markdown_strong__Rxk9v\">PsExec:<\/strong> Runs processes on remote systems\u2014commonly abused for executing commands across hosts.<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div><strong class=\"Markdown_strong__Rxk9v\">Credential dumping:<\/strong> Extracts credentials stored in memory or the registry using tools like Mimikatz.<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div><strong class=\"Markdown_strong__Rxk9v\">Shared network access abuse:<\/strong> Moves through shared drives, mapped folders, or misconfigured file shares.<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div><strong class=\"Markdown_strong__Rxk9v\">Token impersonation:<\/strong> Hijacks access tokens to impersonate users\u2014especially high-privilege accounts.<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div><strong class=\"Markdown_strong__Rxk9v\">Internal spear phishing:<\/strong> Sends malicious content to users within the network to steal further credentials or plant malware.<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div><strong class=\"Markdown_strong__Rxk9v\">Exploitation of poor password hygiene:<\/strong> Takes advantage of reused or weak credentials, especially when password management practices are lacking.<\/div><\/li><\/ul><p>\u00a0<\/p><\/div><div id=\"section-5\"><h3 class=\"Heading_root__WNfE8 Heading_heading20__nWkNG Heading_primary__oRqei Heading_medium__JTPnX SharedArticleMarkdownComponents_heading__ZOvVm SharedArticleMarkdownComponents_heading3__usnTx SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"heading\">Real-world example: SolarWinds attack (2020)<\/h3><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">One of the most devastating lateral movement attacks to date occurred during the <a class=\"Link_root__D2Mxm Link_inherit__j4LYr Link_medium__8LZIg SharedArticleMarkdownComponents_link__AVHkv\" href=\"https:\/\/www.zdnet.com\/article\/microsoft-fireeye-confirm-solarwinds-supply-chain-attack\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">SolarWinds supply chain breach<\/a>. After compromising the Orion software update mechanism, cybercriminals gained initial access to multiple US government and enterprise networks.<\/p><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">Once inside, they used credential dumping, token impersonation, and customized lateral movement techniques to silently traverse systems for months\u2014targeting domain controllers and cloud environments.<\/p><ul class=\"SharedArticleMarkdownComponents_list__7fmEv SharedArticleMarkdownComponents_horizontalSpacing__ayEp5 List_list__ysCsa\"><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div>Estimated impact: ~18,000 organizations received the malicious update<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div>Dwell time: Up to 9 months undetected<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div>Threat group: APT29 (Cozy Bear), linked to Russian intelligence<\/div><\/li><\/ul><h2 id=\"how-to-detect-lateral-movement\" class=\"Heading_root__WNfE8 Heading_heading30__zsK4j Heading_primary__oRqei Heading_medium__JTPnX SharedArticleMarkdownComponents_heading__ZOvVm SharedArticleMarkdownComponents_heading2__1AkXN SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"heading\">How to detect lateral movement<\/h2><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">Detecting lateral movement is particularly difficult because attackers often mimic legitimate user behavior and exploit trusted internal systems. However, several strategies and technologies can help expose suspicious activity before it leads to a full-blown compromise:<\/p><ul class=\"SharedArticleMarkdownComponents_list__7fmEv SharedArticleMarkdownComponents_horizontalSpacing__ayEp5 List_list__ysCsa\"><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div><strong class=\"Markdown_strong__Rxk9v\">Behavioral analytics:<\/strong> One of the most effective ways to detect lateral movement is to analyze user behavior over time to identify sudden deviations\u2014like a user accessing unfamiliar systems or logging in at odd hours\u2014that may signal compromise.<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div><strong class=\"Markdown_strong__Rxk9v\">Endpoint monitoring:<\/strong> Deploy Endpoint Detection and Response (EDR) tools to track processes, login attempts, and access to sensitive assets. Watch for signs of credential dumping or remote command execution.<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div><strong class=\"Markdown_strong__Rxk9v\">Unusual access patterns:<\/strong> Monitor for activity that falls outside normal user roles or workflows\u2014 such as PsExec or RDP use between endpoints that don\u2019t typically communicate.<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div><strong class=\"Markdown_strong__Rxk9v\">Multi-factor authentication (MFA) alerts:<\/strong> Watch for failed or bypassed MFA attempts, which can serve as early indicators of a lateral movement attack in progress.<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div><strong class=\"Markdown_strong__Rxk9v\">Threat detection systems:<\/strong> Use machine learning-based threat detection to flag low-and-slow attacks that traditional defenses might miss. These systems can correlate subtle anomalies across the network to detect lateral movement.<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div><strong class=\"Markdown_strong__Rxk9v\">Audit privileged account usage:<\/strong> Closely monitor high-level accounts for unusual activity, especially after initial compromise. Lateral movement often involves attackers attempting to escalate their own privileges and abuse these accounts.<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div><strong class=\"Markdown_strong__Rxk9v\">Track remote service usage:<\/strong> Investigate unexpected or unauthorized use of internal remote services, which can be leveraged to pivot across systems.<\/div><\/li><li class=\"ListItem_item__4bqJC SharedArticleMarkdownComponents_listItem___bICC\"><div><strong class=\"Markdown_strong__Rxk9v\">Shrink the attack surface:<\/strong> While not a detection method in itself, limiting lateral access through segmentation and access control boosts visibility and raises red flags when violations occur.<\/div><\/li><\/ul><h2 id=\"steps-to-preventing-lateral-movement\" class=\"Heading_root__WNfE8 Heading_heading30__zsK4j Heading_primary__oRqei Heading_medium__JTPnX SharedArticleMarkdownComponents_heading__ZOvVm SharedArticleMarkdownComponents_heading2__1AkXN SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"heading\">Steps to preventing lateral movement<\/h2><\/div><div id=\"section-6\"><div class=\"ArticleImage_root__KtuDJ BlogArticle_articleImage__qw2Gm\"><img decoding=\"async\" class=\"ArticleImage_image__L_45g\" src=\"https:\/\/content.nordlayer.com\/uploads\/How_to_prevent_lateral_movement_5_core_defense_strategies_97f6eee4b9.webp\" sizes=\"(max-width: 500px) 500px, (max-width: 750px) 750px, (max-width: 1000px) 1000px, 100vw\" srcset=\"https:\/\/content.nordlayer.com\/uploads\/large_How_to_prevent_lateral_movement_5_core_defense_strategies_97f6eee4b9.webp 1000w, https:\/\/content.nordlayer.com\/uploads\/small_How_to_prevent_lateral_movement_5_core_defense_strategies_97f6eee4b9.webp 500w, https:\/\/content.nordlayer.com\/uploads\/medium_How_to_prevent_lateral_movement_5_core_defense_strategies_97f6eee4b9.webp 750w, https:\/\/content.nordlayer.com\/uploads\/How_to_prevent_lateral_movement_5_core_defense_strategies_97f6eee4b9.webp\" alt=\"Infographic titled &quot;How to prevent lateral movement: 5 core defense strategies&quot; showing five circular icons and labels beneath them.\" \/><\/div><\/div><div id=\"section-7\"><h3 class=\"Heading_root__WNfE8 Heading_heading20__nWkNG Heading_primary__oRqei Heading_medium__JTPnX SharedArticleMarkdownComponents_heading__ZOvVm SharedArticleMarkdownComponents_heading3__usnTx SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"heading\">1. Segment and isolate the network<\/h3><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">Flat networks make lateral movement easy. <strong class=\"Markdown_strong__Rxk9v\">Implement internal segmentation<\/strong> to limit access between departments, teams, and resources. Isolate sensitive assets\u2014like network controllers and critical servers\u2014within protected zones that can only be accessed under strict conditions. Technologies like software-defined perimeters and microsegmentation can help reduce exposure and enforce contextual access boundaries.<\/p><h3 class=\"Heading_root__WNfE8 Heading_heading20__nWkNG Heading_primary__oRqei Heading_medium__JTPnX SharedArticleMarkdownComponents_heading__ZOvVm SharedArticleMarkdownComponents_heading3__usnTx SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"heading\">2. Enforce least privilege access<\/h3><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">Users should only have access to the systems and data they absolutely need. Overprivileged accounts are a key enabler of lateral movement. <strong class=\"Markdown_strong__Rxk9v\">Apply the <a class=\"Link_root__D2Mxm Link_inherit__j4LYr Link_medium__8LZIg SharedArticleMarkdownComponents_link__AVHkv\" href=\"https:\/\/nordlayer.com\/learn\/access-control\/principle-of-least-privilege\/\">principle of least privilege (PoLP)<\/a><\/strong> across all identities\u2014users, admins, and services\u2014and ensure privileges are continuously reviewed and revoked when no longer needed.<\/p><h3 class=\"Heading_root__WNfE8 Heading_heading20__nWkNG Heading_primary__oRqei Heading_medium__JTPnX SharedArticleMarkdownComponents_heading__ZOvVm SharedArticleMarkdownComponents_heading3__usnTx SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"heading\">3. Monitor identity and access<\/h3><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">Track who is accessing what, from where, and when. <strong class=\"Markdown_strong__Rxk9v\">Continuous monitoring of identity and access<\/strong> helps surface abnormal behavior\u2014like a standard user accessing sensitive systems or credentials being used in new geographies. Integrate single sign-on (SSO), strong password policies, and Role-Based Access Control (RBAC) to maintain visibility and reduce risk, and align with <a class=\"Link_root__D2Mxm Link_inherit__j4LYr Link_medium__8LZIg SharedArticleMarkdownComponents_link__AVHkv\" href=\"https:\/\/nordlayer.com\/blog\/network-monitoring-best-practices\/\">network monitoring best practices<\/a>.<\/p><h3 class=\"Heading_root__WNfE8 Heading_heading20__nWkNG Heading_primary__oRqei Heading_medium__JTPnX SharedArticleMarkdownComponents_heading__ZOvVm SharedArticleMarkdownComponents_heading3__usnTx SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"heading\">4. Detect and respond in real-time<\/h3><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">Lateral movement is often subtle and slow. <strong class=\"Markdown_strong__Rxk9v\">Use detection tools<\/strong> that combine behavior analysis, anomaly detection, and response automation to spot threats before they escalate. Visibility across endpoints and cloud services is essential to correlate signals and trigger rapid remediation actions.<\/p><h3 class=\"Heading_root__WNfE8 Heading_heading20__nWkNG Heading_primary__oRqei Heading_medium__JTPnX SharedArticleMarkdownComponents_heading__ZOvVm SharedArticleMarkdownComponents_heading3__usnTx SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"heading\">5. Implement Zero Trust architecture<\/h3><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\"><a class=\"Link_root__D2Mxm Link_inherit__j4LYr Link_medium__8LZIg SharedArticleMarkdownComponents_link__AVHkv\" href=\"https:\/\/nordlayer.com\/learn\/zero-trust\/how-to-implement\/\"><strong class=\"Markdown_strong__Rxk9v\">Adopting a Zero Trust approach<\/strong><\/a> ensures no user or device is inherently trusted\u2014even inside the network. Authenticate every session, verify device posture, and validate contextual risk before granting access. This architecture effectively disrupts lateral movement paths by requiring continuous verification.<\/p><h2 id=\"nordlayers-role-in-lateral-movement-defense\" class=\"Heading_root__WNfE8 Heading_heading30__zsK4j Heading_primary__oRqei Heading_medium__JTPnX SharedArticleMarkdownComponents_heading__ZOvVm SharedArticleMarkdownComponents_heading2__1AkXN SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"heading\">NordLayer\u2019s role in lateral movement defense<\/h2><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">Preventing lateral movement requires more than visibility\u2014it demands <strong class=\"Markdown_strong__Rxk9v\">control over how users interact with your network from the inside out<\/strong>. NordLayer is designed to give IT teams that control, combining intelligent access policies with modern network architecture to block lateral paths and contain threats before they escalate.<\/p><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">A key part of this strategy is segmentation. With <a class=\"Link_root__D2Mxm Link_inherit__j4LYr Link_medium__8LZIg SharedArticleMarkdownComponents_link__AVHkv\" href=\"https:\/\/nordlayer.com\/features\/network-segmentation\/\">NordLayer\u2019s network segmentation tools<\/a>, organizations can create secure, logically separated environments that limit movement between users, departments, and critical infrastructure. Whether your team is fully remote, hybrid, or distributed across multiple locations, segmentation ensures attackers can\u2019t freely pivot once inside.<\/p><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">Identity and access management is just as essential. NordLayer supports <a class=\"Link_root__D2Mxm Link_inherit__j4LYr Link_medium__8LZIg SharedArticleMarkdownComponents_link__AVHkv\" href=\"https:\/\/nordlayer.com\/identity-access-management\/\">granular access controls and SSO integration<\/a>, allowing administrators to define exactly who can reach what\u2014and under which conditions. This level of control makes it easier to flag anomalies, shut down credential abuse, and enforce least-privilege policies across the board.<\/p><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">At the core of NordLayer\u2019s approach is <a class=\"Link_root__D2Mxm Link_inherit__j4LYr Link_medium__8LZIg SharedArticleMarkdownComponents_link__AVHkv\" href=\"https:\/\/nordlayer.com\/zero-trust\/network-access\/\">Zero Trust Network Access (ZTNA)<\/a>, which eliminates the assumption that anything inside your network should be trusted by default. Every user, device, and request is authenticated continuously, with access granted only if context, location, and risk level align. This disrupts the internal freedom lateral movement attacks rely on\u2014<strong class=\"Markdown_strong__Rxk9v\">stopping threats at the access point<\/strong>, even after initial compromise.<\/p><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\">For organizations, the stakes are high: lateral movement attacks don\u2019t just steal data\u2014they threaten operations, reputation, and compliance. NordLayer empowers IT leaders, CISOs, and security architects to go beyond detection and actively architect environments that are resilient by design. When attackers can\u2019t move freely, they can\u2019t succeed\u2014and that\u2019s where NordLayer gives you the edge.<\/p><p class=\"Text_text___v2aO SharedArticleMarkdownComponents_paragraph__va3m1 SharedArticleMarkdownComponents_horizontalSpacing__ayEp5\" data-testid=\"text\"><a class=\"Link_root__D2Mxm Link_inherit__j4LYr Link_medium__8LZIg SharedArticleMarkdownComponents_link__AVHkv\" href=\"https:\/\/nordlayer.com\/contact-sales\/\">Contact sales<\/a> to see how NordLayer can help your organization.<\/p><p data-testid=\"text\">\u00a0<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9e34e91 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"9e34e91\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bb2c932\" data-id=\"bb2c932\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bfd91ca elementor-widget elementor-widget-shortcode\" data-id=\"bfd91ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63561\" class=\"elementor elementor-63561\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b6aa2c4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1b6aa2c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b283ee5\" data-id=\"1b283ee5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e466f1a elementor-widget elementor-widget-text-editor\" data-id=\"4e466f1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordLayer<br \/><\/strong>NordLayer is an adaptive network access security solution for modern businesses \u2013 from the world\u2019s most trusted cybersecurity brand, Nord Security.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>\u00a0 Summary: Understand how lateral movement enables deep [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_feature_clip_id":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[973,1130,1305,61],"tags":[974,1077,1132],"class_list":["post-119368","post","type-post","status-publish","format-standard","hentry","category-nord-security","category-nordlayer","category-1305","category-press-release","tag-nord-security","tag-1077","tag-nordlayer"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to prevent lateral movement\u2014the most overlooked cyber threat - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordlayer.com\/blog\/how-to-prevent-lateral-movement\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to prevent lateral movement\u2014the most overlooked cyber threat - Version 2\" \/>\n<meta property=\"og:description\" content=\"\u00a0 Summary: Understand how lateral movement enables deep [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordlayer.com\/blog\/how-to-prevent-lateral-movement\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-07T08:26:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-07T08:28:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/content.nordlayer.com\/uploads\/How_to_how_to_prevent_lateral_movement_11a5aa5cf6.webp\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/how-to-prevent-lateral-movement\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2025\\\/08\\\/how-to-prevent-lateral-movement-the-most-overlooked-cyber-threat\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"How to prevent lateral movement\u2014the most overlooked cyber threat\",\"datePublished\":\"2025-08-07T08:26:06+00:00\",\"dateModified\":\"2025-08-07T08:28:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2025\\\/08\\\/how-to-prevent-lateral-movement-the-most-overlooked-cyber-threat\\\/\"},\"wordCount\":1648,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/how-to-prevent-lateral-movement\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/content.nordlayer.com\\\/uploads\\\/How_to_how_to_prevent_lateral_movement_11a5aa5cf6.webp\",\"keywords\":[\"Nord Security\",\"2025\",\"NordLayer\"],\"articleSection\":[\"Nord Security\",\"NordLayer\",\"2025\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2025\\\/08\\\/how-to-prevent-lateral-movement-the-most-overlooked-cyber-threat\\\/\",\"url\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/how-to-prevent-lateral-movement\\\/\",\"name\":\"How to prevent lateral movement\u2014the most overlooked cyber threat - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/how-to-prevent-lateral-movement\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/how-to-prevent-lateral-movement\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/content.nordlayer.com\\\/uploads\\\/How_to_how_to_prevent_lateral_movement_11a5aa5cf6.webp\",\"datePublished\":\"2025-08-07T08:26:06+00:00\",\"dateModified\":\"2025-08-07T08:28:10+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/how-to-prevent-lateral-movement\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordlayer.com\\\/blog\\\/how-to-prevent-lateral-movement\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/how-to-prevent-lateral-movement\\\/#primaryimage\",\"url\":\"https:\\\/\\\/content.nordlayer.com\\\/uploads\\\/How_to_how_to_prevent_lateral_movement_11a5aa5cf6.webp\",\"contentUrl\":\"https:\\\/\\\/content.nordlayer.com\\\/uploads\\\/How_to_how_to_prevent_lateral_movement_11a5aa5cf6.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/how-to-prevent-lateral-movement\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to prevent lateral movement\u2014the most overlooked cyber threat\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to prevent lateral movement\u2014the most overlooked cyber threat - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordlayer.com\/blog\/how-to-prevent-lateral-movement\/","og_locale":"en_US","og_type":"article","og_title":"How to prevent lateral movement\u2014the most overlooked cyber threat - Version 2","og_description":"\u00a0 Summary: Understand how lateral movement enables deep [&hellip;]","og_url":"https:\/\/nordlayer.com\/blog\/how-to-prevent-lateral-movement\/","og_site_name":"Version 2","article_published_time":"2025-08-07T08:26:06+00:00","article_modified_time":"2025-08-07T08:28:10+00:00","og_image":[{"url":"https:\/\/content.nordlayer.com\/uploads\/How_to_how_to_prevent_lateral_movement_11a5aa5cf6.webp","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordlayer.com\/blog\/how-to-prevent-lateral-movement\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/2025\/08\/how-to-prevent-lateral-movement-the-most-overlooked-cyber-threat\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"How to prevent lateral movement\u2014the most overlooked cyber threat","datePublished":"2025-08-07T08:26:06+00:00","dateModified":"2025-08-07T08:28:10+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/zh\/2025\/08\/how-to-prevent-lateral-movement-the-most-overlooked-cyber-threat\/"},"wordCount":1648,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/how-to-prevent-lateral-movement\/#primaryimage"},"thumbnailUrl":"https:\/\/content.nordlayer.com\/uploads\/How_to_how_to_prevent_lateral_movement_11a5aa5cf6.webp","keywords":["Nord Security","2025","NordLayer"],"articleSection":["Nord Security","NordLayer","2025","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/zh\/2025\/08\/how-to-prevent-lateral-movement-the-most-overlooked-cyber-threat\/","url":"https:\/\/nordlayer.com\/blog\/how-to-prevent-lateral-movement\/","name":"How to prevent lateral movement\u2014the most overlooked cyber threat - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordlayer.com\/blog\/how-to-prevent-lateral-movement\/#primaryimage"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/how-to-prevent-lateral-movement\/#primaryimage"},"thumbnailUrl":"https:\/\/content.nordlayer.com\/uploads\/How_to_how_to_prevent_lateral_movement_11a5aa5cf6.webp","datePublished":"2025-08-07T08:26:06+00:00","dateModified":"2025-08-07T08:28:10+00:00","breadcrumb":{"@id":"https:\/\/nordlayer.com\/blog\/how-to-prevent-lateral-movement\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordlayer.com\/blog\/how-to-prevent-lateral-movement\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nordlayer.com\/blog\/how-to-prevent-lateral-movement\/#primaryimage","url":"https:\/\/content.nordlayer.com\/uploads\/How_to_how_to_prevent_lateral_movement_11a5aa5cf6.webp","contentUrl":"https:\/\/content.nordlayer.com\/uploads\/How_to_how_to_prevent_lateral_movement_11a5aa5cf6.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/nordlayer.com\/blog\/how-to-prevent-lateral-movement\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"How to prevent lateral movement\u2014the most overlooked cyber threat"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-v3i","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/119368","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=119368"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/119368\/revisions"}],"predecessor-version":[{"id":119372,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/119368\/revisions\/119372"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=119368"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=119368"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=119368"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}