TA0008 Lateral Movement

The adversary is trying to move through your environment. Lateral Movement consists of techniques that adversaries use to enter and control remote systems on a network. Following through on their primary objective often requires exploring the network to find their target and subsequently gaining access to it. Reaching their objective often involves pivoting through multiple systems and accounts to gain. Adversaries might install their own remote access tools to accomplish Lateral Movement or use legitimate credentials with native network and operating system tools, which may be stealthier.

View in MITRE ATT&CK®

ATT&CK Techniques

Technique ID Technique Name Number of Mappings Number of Subtechniques
T1080 Taint Shared Content 21 0
T1091 Replication Through Removable Media 15 0
T1550 Use Alternate Authentication Material 23 4
T1021 Remote Services 47 8
T1563 Remote Service Session Hijacking 37 2
T1072 Software Deployment Tools 51 0
T1210 Exploitation of Remote Services 61 0
T1534 Internal Spearphishing 2 0
T1570 Lateral Tool Transfer 20 0