One of the most important goals in every threat actor's plans is to move laterally through a victim's network after it has been initially compromised. Some attackers may be satisfied with compromising one device -- and if they get lucky, it may be the only one they need. But usually attackers want to move around,