<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2180921&amp;fmt=gif">

Threats! What Threats? Detecting Lateral Movement with Stamus Security Platform

In this article I want to highlight one of the tactics used by malicious actors to move within your network - lateral movement. Let’s define lateral movement and review how Stamus Security Platform can help. 

This series -- Threats! What Threats? – came as a result of a conversation with my colleague Steve Patton. He believed that we at Stamus Networks weren’t going deep enough to elaborate on what we meant when we mentioned “threats”. He made a good point because while we often talk about threats, we had not yet elaborated on which threats, how they work, and why they are harmful.

What is lateral movement and why is it bad?

Top athletes understand the importance of being able to move laterally to evade a defender or mount an attack on goal. This is why athletes spend countless hours training to improve their lateral agility to gain an advantage. 

Similarly, lateral movement allows cyber attackers to move deeper into a compromised environment after gaining initial access, avoiding detection by moving through different hosts. 

A threat actor will often gain access to an endpoint through a phishing attack or malware infection, and then use various tools to obtain increased privileges. The attacker then imitates a legitimate user to move through different systems until they reach their desired end goal of finding sensitive data or high-value assets. By employing lateral movement techniques, an attacker might avoid detection for weeks or months after the initial breach. 

Lateral movement typically progresses through three stages: 

Typical phases of lateral movement - recon, credential dumping and privilege escalation, and gaining access

  1. Reconnaissance 
  2. In this initial stage after an attacker has gained access into the network, they will explore and map out the network, its users, and devices. This allows them to identify operating systems, locate potential payloads, and acquire intelligence that helps inform their future decisions. Attackers do this using external custom tools, open-source tools, or even local Windows tools like Netstat, ARP cache, PowerShell, and the local routing table. After identifying critical areas, the attacker can begin gathering login credentials. 
  1. Credential dumping and privilege escalation
  2. An attacker cannot move through a network without valid login credentials. To obtain credentials, they may use the process of  “credential dumping”. Typosquatting, phishing, keylogging, and tools like Mimikatz are common ways that attackers steal credentials. Once they have one or more valid credentials, attackers can escalate their privileges on the network until they are able to gain access to the target system. 
  1. Gaining access
  2. This process is repeated throughout the network until the attacker accesses and assumes control of the target system. This is often a critical services system which can affect the entire organization when infected with ransomware or another malware program. From there, they can move freely about the network, avoiding detection by staying mobile across various devices. 
  3.  

How does Stamus Security Platform help with lateral movement?

Lateral movement is often very difficult to detect because it has the appearance of normal network traffic. This is achieved using remote access malware tools like Remote Access Trojans (RATs). Because it is very difficult for prevention controls to block lateral movement, the most effective method of defense is early detection. 

Stamus Security Platform (SSP) is well equipped to detect lateral movement because it employs a more complete set of detection methods than one-dimensional intrusion detection system (IDS), network security monitoring (NSM), or network detection and response (NDR) solutions. By observing brute force activities, suspicious administrative behaviors, or suspect SMB/DCERP/ICMP/TCP protocol-related activities, SSP can typically detect lateral movement early in the kill chain timeline after initial system access. 

In addition, unlike other network security solutions, SSP uses advanced prioritization algorithms to cut through the noise caused by a typical IDS or NSM “alert cannon” – all while retaining the context and evidence needed to understand the complete picture of a given incident. In this way, Stamus Security Platform essentially eradicates false positives, and delivers what we call Declarations of Compromise™ to notify the security team of only the most serious and imminent threats like lateral movement. 

So, by searching for anomalies in credential usage, logon failure, app usage, connectivity patterns, port and protocol usage, and connection specifics and details, SSP can detect and prioritize lateral movement attacks and push only the most urgent incidents to the top of your queue. This way the security team can catch threats before they cause substantial damage. 

More information on Stamus Security Platform

So, next time my colleague Steve asks “why don’t we ever mention the types of threats we’re talking about?” I can thank him and point him to this blog series.

If you’d like to get a live demonstration of Stamus Security Platform or discuss how it might help you detect and respond to threats in your network, please click on the button below to request a demo.

D. Mark Durrett

Mark is the chief marketing officer (CMO) at Stamus Networks, where he has responsibility for go-to-market strategy and execution. Mark started his career as an electrical engineer and worked in digital circuit design of networking and telecom hardware for over a decade. He has over 25 years of experience leading marketing, product management and engineering for technology companies. Mark has served as the senior product and marketing executive at Netsertive, Emerging Threats, Overture Networks, Bell and Howell, Covelight Systems and Hatteras Networks. Mark resides in North Carolina, USA.

Schedule a Demo of Stamus Security Platform

REQUEST A DEMO

Related posts

In the Trenches with NDR: NDR Discovers Crypto Wallet Stealer on U.S. University's Network

Tl:DR: A Large U.S. university lacked sufficient visibility into a large segment of its environment...

The Rise of Network Infrastructure Attacks and What to Do About Them

TL;DR: In recent months, CISA, MITRE, CVE.org, and others have announced critical vulnerabilities...

In the Trenches with NDR: K-12 School District Maximizes Visibility While Avoiding Alert Fatigue

TL;DR: An American school district needed to monitor over 5000 school-owned student devices, making...