Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 606

Lateral Movement

What is Lateral Movement?

Lateral MovementThe MITRE ATT&CK tactic (TA0008) covering techniques that let an attacker pivot from one compromised host to others across the environment.


Lateral Movement (MITRE ATT&CK tactic TA0008) groups techniques attackers use to expand their foothold by moving from an initial host to other systems, accounts, or cloud tenants. Common techniques include pass-the-hash, pass-the-ticket, overpass-the-hash, RDP and SSH hijacking, exploiting remote services (SMB, WinRM, WMI, PsExec), abusing tools like Cobalt Strike, and replaying valid OAuth or SAML tokens against cloud APIs. Lateral movement is often the loudest stage of an intrusion in terms of telemetry because it crosses host boundaries. Defenders rely on network segmentation, identity tiering, just-in-time admin, MFA on remote protocols, EDR correlation across hosts, and Sigma/MDE detections for SMB and RPC pivots.

Examples

  1. 01

    Using pass-the-hash with a captured NTLM hash to authenticate to a file server.

  2. 02

    Stealing an RDP session cookie to jump from a workstation to a jump box.

Frequently asked questions

What is Lateral Movement?

The MITRE ATT&CK tactic (TA0008) covering techniques that let an attacker pivot from one compromised host to others across the environment. It belongs to the Defense & Operations category of cybersecurity.

What does Lateral Movement mean?

The MITRE ATT&CK tactic (TA0008) covering techniques that let an attacker pivot from one compromised host to others across the environment.

How does Lateral Movement work?

Lateral Movement (MITRE ATT&CK tactic TA0008) groups techniques attackers use to expand their foothold by moving from an initial host to other systems, accounts, or cloud tenants. Common techniques include pass-the-hash, pass-the-ticket, overpass-the-hash, RDP and SSH hijacking, exploiting remote services (SMB, WinRM, WMI, PsExec), abusing tools like Cobalt Strike, and replaying valid OAuth or SAML tokens against cloud APIs. Lateral movement is often the loudest stage of an intrusion in terms of telemetry because it crosses host boundaries. Defenders rely on network segmentation, identity tiering, just-in-time admin, MFA on remote protocols, EDR correlation across hosts, and Sigma/MDE detections for SMB and RPC pivots.

How do you defend against Lateral Movement?

Defences for Lateral Movement typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Lateral Movement?

Common alternative names include: Pivoting, Internal movement.

Related terms

See also