There are different kinds of movement. The technique that was the threat actor using to move through the network is Lateral Movement.
Network Lateral Movement, is simply known as a method used by cyber attackers, or threat actors, to quickly move through a network as they search for the key data and assets that are the main hit or target of their attack work.
Examples of Lateral movement are:
See full question below
Quinton has been asked to analyze the TTPs of an attack that recently occurred and prepare an SOP to hunt for future treats. When researching the recent attack, Quinton discovered that after penetrating the system, the threat actor moved through the network using elevated credentials. Which technique was the threat actor using to move through the network?
A. Initial Compromise
B. Lateral movement
C. Privilege escalation
D. Data exfiltration
Learn more about Lateral movement from
https://brainly.com/question/1245899