〈   Governance and cyber risks
Timeline of a cyberattack

Chapter 2.3

Lateral movement


After infiltrating the network or IT system, the attacker seeks to gain increased access by installing tools to monitor business processes and systems, thereby boosting the potential impact and financial rewards of the attack.

Time scale

Weeks – months

Tactics used

  • Privilege escalation
  • Network traversals
  • Passive monitoring

2023 © Trust Valley. All rights reserved.