ExtraHop named a Leader in the 2025 Forrester Wave™: Network Analysis And Visibility Solutions

  • Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

White Paper

Decrypting the Shadows: Adversaries Hiding Lateral Movements in the Modern Enterprise

The Paradox of Enterprise Tools

Download the white paper
cover for Decrypting the Shadows: Adversaries Hiding Lateral Movements in the Modern Enterprise
Decrypting the Shadows: Adversaries Hiding Lateral Movements in the Modern Enterprise

Key Takeaways

  1. The Rise of “Living off the Land” Strategies (LOLBAS). Adversaries increasingly utilize legitimate tools like PowerShell and WMI to blend into "trusted noise," a tactic implicated in 84% of sophisticated attacks in 2025.
  2. Encryption as a Cloak for Lateral Movement. Legitimate administrative encryption in protocols like WSMAN and MS-RPC provides a perfect hiding place for attackers to establish remote shells that appear as normal traffic.
  3. Critical Blind Spots in EDR and Logging. Endpoint detection faces fundamental deficiencies, including an inability to monitor unmanaged devices and a vulnerability to log suppression or AMSI memory patching by sophisticated actors.
  4. The Necessity of Decryption for Ground Truth. Advanced Network Detection and Response (NDR) acts as an immutable source of truth by decrypting protocols to reveal specific operation numbers and full command arguments.
  5. Persistent Threats and the Strategic Shift to NDR. With state-sponsored groups like Volt Typhoon and MuddyWater using "pre-planted backdoors" in 2026, defenders must shift to deep, decrypted protocol analysis to distinguish legitimate admin functions from malicious pivots.

Associated content