Nearly 60 per cent of cyber attacks target multiple components on an organisation's network, reseach from security firm Carbon Black states.
This supports the theory that breaches like today's reported Marriot Hotel Group hack - which involved criminals spending more than four years inside the company's system to steal 500 million customer data records over that time - may not be isolated attacks.
Tom Kellermann, chief cybersecurity cfficer at Carbon Black said:
"It appears there had been unauthorised access to the Starwood network since 2014, demonstrating that attackers will get into an enterprise and attempt to remain undetected.
"A recent Carbon Black threat report found that nearly 60 per cent of attacks now involve lateral movement, which means attackers aren't just going after one component of an organisation - they're getting in, moving around and seeking more targets as they go."
Carbon Black's report also found that more than half of attackers now use their victim primarily for a practice known as "island hopping".
"In these campaigns, attackers first target an organisation's affiliates, often smaller companies with immature security postures and this can often be the case during a merger or acquisition," said Kellermann.
"This means that data at every point in the supply chain may be at risk, from customers, to partners and potential acquisitions."
Forrester analyst Enza Iannopollo has also called the Marriott breach an attack with "the potential to trigger the first hefty GDPR fine".
"The ingredients are all here," said Iannopollo.
"The volume of personal data exfiltrated, more than 500 million customers, the sensitivity of the data, potentially including customers' passport details, name, address, and even encryption keys, and the length of the breach which started in 2014."
To learn more about protecting about cyber threats in an increasingly hostile landscape, read a new report from Computing and experts at Carbon Black, which focuses on introducing the human element of "threat hunters" into an organisation to more proactively tackle the more sophisticated, human-driven activities which are becoming a greater reality of the IT security world.
Vulnerability in Qualcomm's Secure Execution Environment could allow hackers to steal sensitive data from Android devices
QSEE is an implementation of Trusted Execution Environment based on ARM TrustZone technology
Devices become vulnerable when they are initially paired to a mobile app
The search giant has decided against including contextual content categories in the bid requests it sends to buyers
The PureLocker ransomware appears to have links with a malware-as-a-service provider
It was a complete mistake, honest, swears Facebook