Because lateral movement can rapidly escalate across a network, early detection is critical for mitigating damage and losses. Security experts recommend taking actions that help distinguish normal network processes from suspicious activities, such as:
Analyze user behavior: Unusually high volumes of user log-ons, log-ons that take place late at night, users accessing unexpected devices or applications, or a surge in failed log-ons can all be signs of lateral movement. Behavioral analytics with machine learning can identify and alert security teams of abnormal user behavior.
Protect endpoints: Vulnerable network-connected devices such as personal workstations, smartphones, tablets and servers are the primary targets of cyber threats. Security solutions such as endpoint detection and response (EDR) and web application firewalls are critical for monitoring endpoints and preventing network breaches in real time.
Create network partitions: Network segmentation can help stop lateral movement. Requiring separate access protocols for different areas of a network limits a hacker’s ability to branch out. It also makes it easier to detect unusual network traffic.
Monitor data transfers: A sudden acceleration of database operations or massive transfers of data to an unusual location could signal that lateral movement is underway. Tools that monitor and analyze event logs from data sources, such as security information and event management (SIEM) or network detection and response (NDR), can help identify suspicious data transfer patterns.
Use multi-factor authentication (MFA): If hackers are successful in stealing user credentials, multi-factor authentication can help prevent a breach by adding another layer of security. With MFA, stolen passwords alone will not provide access to protected systems.
Investigate potential threats: Automated security systems can provide false positives while missing previously unknown or non-remediated cyber threats. Manual threat hunting informed by the latest threat intelligence can help organizations investigate and prepare an effective incident response for potential threats.
Be proactive: Patching and updating software, enforcing least privilege system access, training employees on security measures, and penetration testing can help prevent lateral movement. It's vital to continually address vulnerabilities that create opportunities for hackers.