Nearly 60 per cent of cyber attacks target multiple components on an organisation's network, reseach from security firm Carbon Black states.
This supports the theory that breaches like today's reported Marriot Hotel Group hack - which involved criminals spending more than four years inside the company's system to steal 500 million customer data records over that time - may not be isolated attacks.
Tom Kellermann, chief cybersecurity cfficer at Carbon Black said:
"It appears there had been unauthorised access to the Starwood network since 2014, demonstrating that attackers will get into an enterprise and attempt to remain undetected.
"A recent Carbon Black threat report found that nearly 60 per cent of attacks now involve lateral movement, which means attackers aren't just going after one component of an organisation - they're getting in, moving around and seeking more targets as they go."
Carbon Black's report also found that more than half of attackers now use their victim primarily for a practice known as "island hopping".
"In these campaigns, attackers first target an organisation's affiliates, often smaller companies with immature security postures and this can often be the case during a merger or acquisition," said Kellermann.
"This means that data at every point in the supply chain may be at risk, from customers, to partners and potential acquisitions."
Forrester analyst Enza Iannopollo has also called the Marriott breach an attack with "the potential to trigger the first hefty GDPR fine".
"The ingredients are all here," said Iannopollo.
"The volume of personal data exfiltrated, more than 500 million customers, the sensitivity of the data, potentially including customers' passport details, name, address, and even encryption keys, and the length of the breach which started in 2014."
To learn more about protecting about cyber threats in an increasingly hostile landscape, read a new report from Computing and experts at Carbon Black, which focuses on introducing the human element of "threat hunters" into an organisation to more proactively tackle the more sophisticated, human-driven activities which are becoming a greater reality of the IT security world.
The leaked documents offered step-by-step guidance about how to pass the CREST exams
Remote working has expanded the digital perimeter of many organisations, and that opens them up to risks
Attackers likely entered the network through a phishing scam or brute force attack
An anonymous hacker claims to have breached Intel server earlier this year and stolen data from the system