Transcript
A (0:02)
You're listening to the Cyberwire network, powered by N2K.
B (0:11)
And now a message from our sponsor. Zscaler, the leader in cloud security enterprises have spent billions of dollars on firewalls and VPNs, yet breaches continue to rise by an 18% year over year increase in ransomware attacks and a $75 million record payout in 2024. These traditional security tools expand your attack surface with public facing IPs that are exploited by bad actors more easily than ever with AI tools. It's time to rethink your security Zscaler Zero Trust plus AI stops attackers by hiding your attack surface, making apps and IPs invisible eliminating lateral movement connecting users only to specific apps, not the entire network continuously verifying every request based on identity and context simplifying security management with AI powered automation and detecting threats using AI to analyze over 500 billion daily transactions hackers can't attack what they can't see. Protect your organization with Zscaler Zero Trust and AI. Learn more@zscaler.com Security.
A (1:34)
The word is lateral movement spelled lateral for adjacent and movement for an act of changing location or position. Definition the phase of a typical cyber adversary group's attack sequence after the initial compromise, and usually after the group has established a command and control channel where the group moves through the victim's network by compromising as many systems as it can by looking for the data it has come to steal or to destroy. Example Sentence Fancy Bear Members move laterally within the Democratic Congressional Campaign Committee, or dccc, and the Democratic National Committee or DNC networks, compromising other victims Machines seeking files and folders that mention Benghazi and opposition Research Origin and context during the first Gulf War in 1991, Iraq's mobile Scud missiles gave the United States Air Force and Navy pilots trouble. Iraqi soldiers were able to fire them long before the US Planes could find their location and blow them up. After the war, US Air Force General John Jumper addressed the issue by changing air combat doctrine and formalizing the techniques necessary to compress the time to find and kill the enemy on the battlefield. He called the new doctrinal model Find, Fix, Track, Target, Engage and assess or F2T2 eh for short, because you know military acronyms. More simply, they call it the kill chain. Jumper's mandate to the Air Force was to compress the kill chain from hours or days to under 10 minutes. Fast forward to 2010. The Lockheed Martin research team took the kill chain idea and applied it to cyber defense. They published the now historic paper Intelligence Driven Computer Network Defense informed by analysis of Adversary Campaigns and Intrusion Kill Chains by Hutchins, Cloppert and Amin. The author's main thesis is that cyber adversaries, regardless of their motivation, crime, espionage, hacktivism, low level cyber conflict or just general mischief, and regardless of the toolset they use, must traverse the same digital ground to complete their task. All cyber adversaries have to negotiate the same attack milestones to be successful. Since publication, many researchers have added their spin to the kill chain idea, but the general idea has remained the same. In the original paper, the Lockheed Martin research team labeled the milestones as recon, weaponization, delivery, exploitation, installation, command and control, and actions on the objectives. Within the actions on the objectives milestone, the authors describe lateral movement. Take for instance the supply chain attack on the Texas based IT management company SolarWinds. The adversary group behind the attacks, Dark Halo, aka Nobelium, Solar Storm, Stellar Particle and UNC 2452 gained initial access by compromising the SolarWinds software update system and delivering malicious code to the SolarWinds customer base. For lateral movement, Dark Halo compromised adjacent machines looking for administrative credentials generally and Azure Microsoft 365 authentication credentials. Specific Nerd Reference In a Morgan Franklin consulting webinar in 2021, Mike Cloppert, one of the authors of the original Lockheed Martin paper, described the kill chain this way.
![lateral movement (noun) [Word Notes] - Hacking Humans cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F8797f03a-a50b-11ea-b6c0-87ebb093948d%2Fimage%2Fhacking-humans-cover-art-cw.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1920&q=75)