Preparation
Archive Data
Authorization Token Staging
Boot Order Manipulation
CCTV Enumeration
Circumventing Security Controls
Data Obfuscation
Data Staging
Device Mounting
Email Collection
External Media Formatting
File Download
File Exploration
Impersonation
Increase Privileges
IT Ticketing System Exploration
Joiner
Mover
Network Scanning
On-Screen Data Collection
Persistent Access via Bots
Physical Disk Removal
Physical Exploration
Physical Item Smuggling
Private / Incognito Browsing
Read Windows Registry
Remote Desktop (RDP)
Security Software Enumeration
Social Engineering (Outbound)
Software Installation
- Installation of Dark Web-Capable Browsers
- Installing Browser Extensions
- Installing Browsers
- Installing Cloud Storage Applications
- Installing FTP Clients
- Installing Messenger Applications
- Installing Note-Taking Applications
- Installing RDP Clients
- Installing Screen Sharing Software
- Installing SSH Clients
- Installing Virtual Machines
- Installing VPN Applications
Software or Access Request
Suspicious Web Browsing
Testing Ability to Print
VPN Usage
- ID: PR032
- Created: 27th November 2025
- Updated: 27th November 2025
- Contributor: The ITM Team
Mover
The subject transitions internally within the organization (changing teams, departments, or roles) with the pre-formed intent to gain access to sensitive data, circumvent existing controls, or otherwise contravene internal policies. Unlike ordinary internal mobility driven by career growth or business need, mover-motivated behavior reflects an intentional exploitation of trust, structural opacity, or access privileges.
These subjects may actively seek out roles with higher entitlements, reduced scrutiny, or privileged visibility, such as administrative, developer, or compliance-adjacent positions. In some cases, the move may be strategic, occurring only after access restrictions or audit trails were encountered in a prior role. The behavior is often concealed within legitimate transfer processes and is rarely flagged by automated systems due to its formal procedural alignment.
Risk is elevated when access control systems do not enforce least privilege during role transitions, resulting in entitlement accumulation or residual access across multiple roles. This enables subjects to retain legacy access while acquiring new privileges in the destination team. Such conditions create a lateral movement surface that mirrors adversarial posturing seen in external threat models but is internally sanctioned.
Investigators should be alert to post-transfer behavior that reflects opportunistic access, unaligned with new role expectations, or targeting historically restricted systems. Mover-motivated actions often signal prior drift, dissatisfaction, or premeditated positioning, and should trigger retrospective analysis of behavioral trajectory and entitlement changes.