What the Heck is a Watering Hole Attack?

We’ve all seen this on National Geographic.  A lion, tiger, or other top predator hides near a water hole and waits for some sort of four-legged lunch to stop by for a drink.  Cyber-criminals and other attackers are using a similar technique to download and install malware from niche or industry specific websites to computer systems at targeted businesses.  Here’s how it works.

  • The attacker will start by researching the intended target business to discover what websites they use frequently, among other information such as names, titles, job functions and email addresses of employees.  This is the reconnaissance phase.
  • The websites in question are typically industry-specific low traffic websites that exist to support businesses in that industry.  For instance, it may be the website of a supplier or wholesaler, professional association, or some other supporting organization.  These small market websites tend to be poorly secured, and may be easily hijacked by taking advantage of security misconfigurations, or broken authentication and session management, or by using standard exploits such as SQL injection.  Credentials for these sites may be harvested through spear-phishing or social engineering attacks, or purchased on the Dark Web.
  • Once the attacker has taken control of the website, they will add malicious downloadable code to the home page or other high traffic pages on the website.  Or they may inject malicious JavaScript or HTML code to redirect the victim to another site where the malware is hosted.  Unsuspecting site visitors are infected with the malware, generally something like  a remote access Trojan horse, keylogger, or a combination product such as a banking Trojan or encryption ransomware program.
  • The final phase is to use the foothold gained at the targeted company to complete the mission and obtain the final objective.  This may be a financial or wire transfer exploit, a ransomware attack, or the exfiltration of sensitive or proprietary information and documents.

Watering hole attacks are not as common as phishing or spear-phishing attacks, but are on the rise.  They are difficult to detect and typically target hard to hack higher-security organizations by breaching their low-security employees, business partners, network-connected vendors or an unsecured wireless network.  This makes them a difficult threat to secure against, detect or mitigate.

Defending against this exploit is best accomplished by:

  • Continually updating your web browsers to the most current and most secure versions.  The newer browsers may be able to warn you that a site is infected, or detect and prevent the malicious download from happening.  Currently, the best browser in this class in Microsoft’s new Edge browser.  But the latest versions of Chrome, Firefox, and Safari all have important security safeguards that can protect you from this exploit.
  • Applying operating system and software updates in a timely manner.  Like we’ve said a hundred times!
  • Use network traffic analysis to detect connections to external command and control servers used by the attackers.
  • Keep an eye on threat exchange websites for information about new exploits and advanced persistent threat activities that may be targeting your industry.  AlienVault’s Open Threat Exchange is a good example.

Check out the articles below for a deeper look at this issue.  And remember just because you have safely used a website many times in the past, today it could be hosting something bad for your business.  Keep your guard up and stay safe.

More information:

0

About the Author:

Cybersecurity guru to business owners in the St Paul, Minneapolis, and western Wisconsin area. Computer security and hacking have been a passion of mine since I entered the computer and networking business in 2000. In 2013 I completed a course of study and certification exam to become a Certified Ethical Hacker (CEH). In 2016 I was certified as a Certified Information Systems Security Professional (CISSP). As Cybersecurity Analyst at The WyzCo Group, I help our clients experience high levels of computer security, network security, and web site security. In addition to consulting on security products and services, we also conduct security audits, vulnerability assessments and full penetration tests. We also provide Cybersecurity Awareness Training for clients and their employees. We also work with companies and organizations that need to certify compliance with regulations such as PCI-DSS (credit card processing), HIPAA/HITECH (medical records), and GLBA. The views expressed on this Web site are mine alone and do not necessarily represent the views of my employer.

Add a Comment