A watering hole attack is a security exploit in which the attacker seeks to compromise a specific group of end users by infecting websites that members of the group are known to visit. The goal is to infect a targeted user’s computer and gain access to the network at the target’s place of employment.

Types

  • Java exploits
  • Flash exploits
  • Internet Explorer(IE)
  • JAR
  • HTML

Malware/Threat actors

Name Type Years Source
Operation Dust Storm threat actor 2010-2015 Op_Dust_Storm_Report.pdf

ZooPark threat actor 2015-2017 ZooPark_for_public_final_edit.pdf

Operation Cleaver threat actor 2012-2013 Cylance_Operation_Cleaver_Report.pdf

stamp.jsp?tp=&arnumber=7460498&tag=1

Epic Turla threat actor < Known years active > The_Epic_Turla_Operation.pdf

KL_Epic_Turla_Technical_Appendix_20140806.pdf

ICIT-Brief-Know-Your-Enemies-2.0.pdf

Turla_2_Penquin.pdf

Energetic Bear threat actor 2010-2014 EB-YetiJuly2014-Public.pdf

APT38 threat actor 2014-2018 rpt-apt38-2018-web_v4.pdf

Careto threat actor 2008-2014 unveilingthemask_v1.0.pdf

Wild Neutron threat actor 2013-2015 WildNeutron_Economic_espionage.pdf

ICIT-Brief-Know-Your-Enemies-2.0.pdf

Preventions

  • Keep all commonly used software and operating systems patched and updated to the latest versions
  • Inspect all popular websites that employees visit and routinely inspect these sites for malware
  • Configure browsers or other tools to use website reputation services to notify users of known, bad websites

Detections

  • Collect user-agents and alert on old versions of flash and IE

Toolkit

<Toolkit instructions, if applicable>

Similar techniques

References