Tag: vulnerability

These articles relate to Vulnerability research and Vulnerability management.

Watering hole attacks are a more sophisticated type of attack than phishing attacks. They are also more difficult to defend against, as the victim is not actively tricked into clicking on a malicious link.

The skill of attack: How watering hole attacks work

There are two broad categories for watering hole attacks.

Opportunistic watering hole

Opportunistic watering hole
Opportunistic watering hole

In one case, there is the opportunistic watering hole attack. In the opportunistic case, the attacker has discovered a vulnerable web site, compromises the web site, and waits for any victim to happen by.

An opportunistic watering hole attack typically follows these steps:

  1. The attacker identifies a website or service that can be compromised.
  2. The attacker compromises the website or service and injects malicious code into it.
  3. Any victim visits the website or uses the service.
  4. The malicious code is executed and the victim is infected with malware.

Targeted watering hole

Targeted watering hole

In a different attack, the watering hole is known to be used by a specific targeted victim. This is a more sophisticated attack against a known specific target.

A targeted watering hole attack typically follows these steps:

  1. The attacker enumerates websites and online services that are known to be frequented by the targeted victim.
  2. The attacker enumerates vulnerabilities on the websites and online services.
  3. The attacker compromises the websites or services and injects malicious code into them.
  4. The victim visits the website or uses the service. In order to evade detection, the attacker may include exemption code to prevent the malware from running on any targets other than the identified target.
  5. The malicious code is executed and the victim is infected with malware.

The malware can then be used to gain access to the victim’s computer or network, or to steal data.

How to defend against watering hole attacks

There are a number of ways to defend against watering hole attacks, including:

Conclusion

Watering hole attacks are a serious threat to organizations and individuals. By taking steps to educate users, use security software, monitor websites, and use intrusion detection systems, organizations can help to protect themselves from these attacks.

  • Identity theft

    Identity theft

    “You don’t know me, but I know your password.  Let me get right to the point. I have access to your computer.  I recorded you through your camera. You can pay me in bitcoin and I will disappear.  If you don’t pay me I will send the video to everyone on your distribution list.”

    Popular online scam

    Have you ever received a threatening email by an unknown assailant who claims they have access to your accounts and have collected damaging information about you?  Well sure, the email might be just a scare email with no real “meat” to it, or… it could be a bit more insidious. How can you know for sure whether this hacker really has control of your computer, or really recorded a video of you?

    (more…)
  • Zero day, 0day, ohday, oh my!

    Zero day, 0day, ohday, oh my!

    Hackers have a few things in their favor when it comes to getting into your network and stealing data.  One of those things is the elusive zero day.   
    When it comes to hacking, a zero day is an “exploitation against a publicly unknown vulnerability”. But hackers don’t need a zero day.  They only need a “zero to me day”.  What does that even mean? 

    (more…)