{"id":21442,"date":"2022-02-24T15:31:04","date_gmt":"2022-02-24T15:31:04","guid":{"rendered":"https:\/\/easydmarc.com\/blog\/?p=21442"},"modified":"2025-05-07T21:56:36","modified_gmt":"2025-05-07T21:56:36","slug":"lateral-phishing-detection-and-prevention","status":"publish","type":"post","link":"https:\/\/easydmarc.com\/blog\/lateral-phishing-detection-and-prevention\/","title":{"rendered":"Lateral Phishing: Detection and Prevention"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Phishing attacks continue to emerge across the globe bringing new challenges to businesses and individuals. <\/span><a href=\"https:\/\/purplesec.us\/resources\/cybersecurity-statistics\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Studies indicate<\/span><\/a><span style=\"font-weight: 400;\"> that 92% of phishing malware is delivered by email. It proves that cybercriminals prefer spreading fraud through emails. We\u2019ve talked about various phishing types on our blog, but in this article, we\u2019re discussing <\/span><b>lateral phishing<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It\u2019s a specific type of email phishing with unique tactics hackers use to bring success to their trickery. Read on to discover everything related to<\/span><b> lateral phishing attacks<\/b><span style=\"font-weight: 400;\"> and the main principles of its detection and prevention.\u00a0<\/span><\/p>\n<h2><b>What is Lateral Phishing?<\/b><\/h2>\n<p><b>Lateral phishing<\/b><span style=\"font-weight: 400;\"> is a kind of cyberattack where the phishing email comes from a corporate email address. Commonly, a <\/span><b>lateral phishing attack<\/b><span style=\"font-weight: 400;\"> starts with an account takeover. The attacker then learns about the company\u2019s inside and outside communications, and can send more malicious emails\u2014effectively spreading the impact of the attack.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The attack goals can include credential theft, money transfers, malware spread, and other dire outcomes. This is an ever-expanding type of cyber attack. As such, <\/span><b>detecting and characterizing lateral phishing at scale <\/b><span style=\"font-weight: 400;\">is crucial for businesses of all sizes<\/span><b>.<\/b><\/p>\n<h2><b>How Do Lateral Phishing Attacks Work?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The main success guarantee of<\/span><b> lateral phishing <\/b><span style=\"font-weight: 400;\">is the trust the attacker obtains. <\/span><b>A lateral phishing attack <\/b><span style=\"font-weight: 400;\">is sent from a legitimate but compromised email account which makes the victim believe the information or request\u00a0 is reliable and legitimate..\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">After gaining access to a company\u2019s email account, attackers can send emails to tens or hundreds of other company email addresses.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Even worse, they can access external communications. Now, imagine what would happen if the compromised account belonged to an executive with access to partners and financial information.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The next step, depending on the hacker\u2019s strategy, would be to impersonate the account owner and send phishing messages. These could be intricately-designed or as broad-catch as needed.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The rest works similarly to other <\/span><a href=\"https:\/\/easydmarc.com\/blog\/phishing-attacks-recognize-and-avoid-email-phishing\/\"><span style=\"font-weight: 400;\">phishing email<\/span><\/a><span style=\"font-weight: 400;\"> techniques., Typically, lateral phishing attackers use tactics like these\u00a0 to convince recipients to take some sort of action (like clicking on a link, divulging sensitive information, or making payments):<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">An alarming message invoking fear and urgency..<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">An email<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">about available updates or shared documents.\u00a0<\/span><\/li>\n<\/ul>\n<h2><b>Why is Lateral Phishing Efficient?<\/b><\/h2>\n<p><b>Lateral phishing<\/b><span style=\"font-weight: 400;\"> has a high success rate as business email compromise (BEC). The very thing that makes this attack efficient is the receiver\u2019s trust.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Unlike other types of phishing, a <\/span><b>lateral phishing attack<\/b><span style=\"font-weight: 400;\"> comes from a trusted internal email which makes it less suspicious. As the recipients recognize the account, they\u2019re more likely to be easily victimized. And so do the rest of the company members. The corporate domain at the end of the address helps to gain more trust too.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Attacking behaviors also provide efficiency to<\/span><b> lateral phishing<\/b><span style=\"font-weight: 400;\">. Some hackers may push the phishing process forward with replies to recipients\u2019 follow-ups.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As you can never be 100% sure if the information in an email is legitimate, we highly recommend you always double-check it to avoid being tricked\u2014even if it comes from a source you know.\u00a0<\/span><\/p>\n<h2><b>How to Prevent and Detect Lateral Phishing Attacks<\/b><\/h2>\n<p><b>Detecting lateral phishing <\/b><span style=\"font-weight: 400;\">is significantly important for a business. Once hacked, your business won\u2019t only face an outflow of confidential data but will also have its reputation damaged. Efficient methods to prevent and detect <\/span><b>lateral phishing attack<\/b><span style=\"font-weight: 400;\">s<\/span> <span style=\"font-weight: 400;\">are therefore crucial<\/span><b>.<\/b><\/p>\n<h3><b>Use Email Providers With Strong Built-In Security Measures<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A good-quality email provider encrypts and protects your messages.. <\/span><b>Detecting and characterizing lateral phishing at scale <\/b><span style=\"font-weight: 400;\">with an email service requires strong built-in security measures.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Before choosing one, make sure it has security features like two-factor authentication or end-to-end encryption. Research to find out if your chosenservice hasn\u2019t undergone any security breaches before. The email provider must be able to filter your emails excellently and detect malicious URLs and attachments, too.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Enhance your privacy security with a secure and trusted email services provider.<\/span><\/p>\n<h3><b>Organize Phishing Awareness Training<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Implement frequent phishing awareness training for your team as hackers evolve daily and new techniques appear. Other phishing attacks are easier to notice by checking the sender\u2019s email address.However, <\/span><b>lateral phishing<\/b><span style=\"font-weight: 400;\"> is often more intricate and needs a closer look at the message content and request type. At this point, only strict policies can help identify the fraud.<\/span><\/p>\n<h3><b>Follow Strict Email Security Policies<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Consider using two- or multi-factor authentication for your emails. It\u2019s bestto use hardware-based tokens or biometric properties. Use them to secure your email account and lower the risk of an account takeover attempt, which could lead to a <\/span><b>lateral phishing attack.<\/b><\/p>\n<p><b>Detecting lateral phishing<\/b><span style=\"font-weight: 400;\"> automatically is better because users aren\u2019t always able to do it on their own. Advanced detection technologies based on artificial intelligence and machine learning are therefore becoming crucial.<\/span><\/p>\n<h3><b>Use Email <a href=\"https:\/\/easydmarc.com\/blog\/top-5-data-security-protocols-in-2021\/\">Security Protocols<\/a><\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Email authentication technologies aren\u2019t new in the industry. But choosing a well-structured strategy is the best way of protecting yourself and your business from a<\/span><b> lateral phishing attack.\u00a0\u00a0<\/b><\/p>\n<p><a href=\"https:\/\/app.easydmarc.com\/register\"><span style=\"font-weight: 400;\">Implement DMARC<\/span><\/a><span style=\"font-weight: 400;\"> email authentication protocols on your domain, getting it fully protected against phishing and spoofing. Although it can take a couple of months(depending on your email volumes, company size, and sources), reaching \u201cp=reject\u201d will save you the trouble of unauthorized communication from your domain. It can help you gain more trust with partners, customers, employees, and vendors.<\/span><\/p>\n<h3><b>Partner With a Managed Service Provider (MSP) or a Managed Security Service Provider (MSSP)<\/b><\/h3>\n<p><b>Detecting lateral phishing<\/b><span style=\"font-weight: 400;\"> and safeguarding against it can be time consuming and expensive, so small and medium businesses with limited resources might need help. MSPs and MSSPs offer affordable and simple solutions for companies with no IT teams.<\/span><\/p>\n<h2><b>Final Thoughts<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Manipulating businesses and individuals becomes easier for attackers everyday, making <\/span><a href=\"https:\/\/easydmarc.com\/blog\/14-types-of-social-engineering-attacks\/\"><span style=\"font-weight: 400;\">social engineering <\/span><\/a><span style=\"font-weight: 400;\">the leading threat of the era. While other phishing types can impact individuals too, <\/span><b>lateral phishing<\/b><span style=\"font-weight: 400;\"> threatens businesses with large and small infrastructures.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To avoid later phishing and its consequences, you need,set processes, awareness, and technical support.\u00a0 <\/span><a href=\"https:\/\/app.easydmarc.com\/register\"><span style=\"font-weight: 400;\">EasyDMARC<\/span><\/a><span style=\"font-weight: 400;\"> is committed to this goal, constantly cultivating new methods to battle against phishing and spoofing.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing attacks continue to emerge across the globe &#8230;<\/p>\n","protected":false},"author":1,"featured_media":21448,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[204,290,199,293,289],"tags":[],"class_list":["post-21442","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-cyberattacks-cyberthreats","category-cybersecurity","category-phishing","category-social-engineering"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Lateral Phishing: Detection and Prevention | EasyDMARC<\/title>\n<meta name=\"description\" content=\"Lateral phishing is a cyberattack where the phishing email comes from a corporate email address and spreads in the system. Read more below.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/lateral-phishing-detection-and-prevention\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Lateral Phishing: Detection and Prevention\" \/>\n<meta property=\"og:description\" content=\"Lateral phishing is a cyberattack where the phishing email comes from a corporate email address and spreads in the system. Read more below.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/lateral-phishing-detection-and-prevention\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDMARC\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-24T15:31:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-07T21:56:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/02\/Detecting-and-Characterizing-Lateral-Phishing-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"910\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EasyDMARC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EasyDMARC\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/lateral-phishing-detection-and-prevention\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/lateral-phishing-detection-and-prevention\\\/\"},\"author\":{\"name\":\"EasyDMARC\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\"},\"headline\":\"Lateral Phishing: Detection and Prevention\",\"datePublished\":\"2022-02-24T15:31:04+00:00\",\"dateModified\":\"2025-05-07T21:56:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/lateral-phishing-detection-and-prevention\\\/\"},\"wordCount\":1007,\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/lateral-phishing-detection-and-prevention\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/Detecting-and-Characterizing-Lateral-Phishing-1.jpg\",\"articleSection\":[\"Blog\",\"Cyberattacks and Cyberthreats\",\"Cybersecurity\",\"Phishing\",\"Social Engineering\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/lateral-phishing-detection-and-prevention\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/lateral-phishing-detection-and-prevention\\\/\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/lateral-phishing-detection-and-prevention\\\/\",\"name\":\"Lateral Phishing: Detection and Prevention | EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/lateral-phishing-detection-and-prevention\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/lateral-phishing-detection-and-prevention\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/Detecting-and-Characterizing-Lateral-Phishing-1.jpg\",\"datePublished\":\"2022-02-24T15:31:04+00:00\",\"dateModified\":\"2025-05-07T21:56:36+00:00\",\"description\":\"Lateral phishing is a cyberattack where the phishing email comes from a corporate email address and spreads in the system. Read more below.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/lateral-phishing-detection-and-prevention\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/lateral-phishing-detection-and-prevention\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/lateral-phishing-detection-and-prevention\\\/#primaryimage\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/Detecting-and-Characterizing-Lateral-Phishing-1.jpg\",\"contentUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/Detecting-and-Characterizing-Lateral-Phishing-1.jpg\",\"width\":1440,\"height\":910,\"caption\":\"Detecting and Characterizing Lateral Phishing 1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/lateral-phishing-detection-and-prevention\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyberattacks and Cyberthreats\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Social Engineering\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/social-engineering\\\/\"},{\"@type\":\"ListItem\",\"position\":6,\"name\":\"Phishing\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/social-engineering\\\/phishing\\\/\"},{\"@type\":\"ListItem\",\"position\":7,\"name\":\"Lateral Phishing: Detection and Prevention\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/img\\\/logo.png\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EasyDMARC\\\/\",\"https:\\\/\\\/x.com\\\/easydmarc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/easydmarc\\\/mycompany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\",\"name\":\"EasyDMARC\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"caption\":\"EasyDMARC\"},\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/author\\\/easydmarc\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Lateral Phishing: Detection and Prevention | EasyDMARC","description":"Lateral phishing is a cyberattack where the phishing email comes from a corporate email address and spreads in the system. Read more below.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/lateral-phishing-detection-and-prevention\/","og_locale":"en_US","og_type":"article","og_title":"Lateral Phishing: Detection and Prevention","og_description":"Lateral phishing is a cyberattack where the phishing email comes from a corporate email address and spreads in the system. Read more below.","og_url":"https:\/\/easydmarc.com\/blog\/lateral-phishing-detection-and-prevention\/","og_site_name":"EasyDMARC","article_publisher":"https:\/\/www.facebook.com\/EasyDMARC\/","article_published_time":"2022-02-24T15:31:04+00:00","article_modified_time":"2025-05-07T21:56:36+00:00","og_image":[{"width":1440,"height":910,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/02\/Detecting-and-Characterizing-Lateral-Phishing-1.jpg","type":"image\/jpeg"}],"author":"EasyDMARC","twitter_card":"summary_large_image","twitter_creator":"@easydmarc","twitter_site":"@easydmarc","twitter_misc":{"Written by":"EasyDMARC","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/easydmarc.com\/blog\/lateral-phishing-detection-and-prevention\/#article","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/lateral-phishing-detection-and-prevention\/"},"author":{"name":"EasyDMARC","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97"},"headline":"Lateral Phishing: Detection and Prevention","datePublished":"2022-02-24T15:31:04+00:00","dateModified":"2025-05-07T21:56:36+00:00","mainEntityOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/lateral-phishing-detection-and-prevention\/"},"wordCount":1007,"publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/lateral-phishing-detection-and-prevention\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/02\/Detecting-and-Characterizing-Lateral-Phishing-1.jpg","articleSection":["Blog","Cyberattacks and Cyberthreats","Cybersecurity","Phishing","Social Engineering"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/easydmarc.com\/blog\/lateral-phishing-detection-and-prevention\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/easydmarc.com\/blog\/lateral-phishing-detection-and-prevention\/","url":"https:\/\/easydmarc.com\/blog\/lateral-phishing-detection-and-prevention\/","name":"Lateral Phishing: Detection and Prevention | EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/lateral-phishing-detection-and-prevention\/#primaryimage"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/lateral-phishing-detection-and-prevention\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/02\/Detecting-and-Characterizing-Lateral-Phishing-1.jpg","datePublished":"2022-02-24T15:31:04+00:00","dateModified":"2025-05-07T21:56:36+00:00","description":"Lateral phishing is a cyberattack where the phishing email comes from a corporate email address and spreads in the system. Read more below.","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/lateral-phishing-detection-and-prevention\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/easydmarc.com\/blog\/lateral-phishing-detection-and-prevention\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/easydmarc.com\/blog\/lateral-phishing-detection-and-prevention\/#primaryimage","url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/02\/Detecting-and-Characterizing-Lateral-Phishing-1.jpg","contentUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/02\/Detecting-and-Characterizing-Lateral-Phishing-1.jpg","width":1440,"height":910,"caption":"Detecting and Characterizing Lateral Phishing 1"},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/lateral-phishing-detection-and-prevention\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/"},{"@type":"ListItem","position":4,"name":"Cyberattacks and Cyberthreats","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/"},{"@type":"ListItem","position":5,"name":"Social Engineering","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/social-engineering\/"},{"@type":"ListItem","position":6,"name":"Phishing","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/social-engineering\/phishing\/"},{"@type":"ListItem","position":7,"name":"Lateral Phishing: Detection and Prevention"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/#website","url":"https:\/\/easydmarc.com\/blog\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97","name":"EasyDMARC","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","caption":"EasyDMARC"},"url":"https:\/\/easydmarc.com\/blog\/author\/easydmarc\/"}]}},"jetpack_featured_media_url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/02\/Detecting-and-Characterizing-Lateral-Phishing-1.jpg","_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/21442","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/comments?post=21442"}],"version-history":[{"count":0,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/21442\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media\/21448"}],"wp:attachment":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media?parent=21442"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/categories?post=21442"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/tags?post=21442"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}