Providing Free and Editor Tested Software Downloads
< HOME | TUTORIALS | GEEK-CADE| WEB TOOLS | YOUTUBE | NEWSLETTER | DEALS! | FORUMS | >

MajorGeeks.com - Serious software for the not so serious geek.

Software Categories

All In One Tweaks
Android
Antivirus & Malware
Appearance
Back Up
Browsers
CD\DVD\Blu-Ray
Covert Ops
Drivers
Drives (SSD, HDD, USB)
Games
Graphics & Photos
Internet Tools
Linux Distros
MajorGeeks Windows Tweaks
Multimedia
Networking
Office & Productivity
System Tools

Other news

· How To and Tutorials
· Life Hacks and Reviews
· Way Off Base
· MajorGeeks Deals
· News
· Off Base
· Reviews




spread the word

· YouTube
· Facebook
· Instagram
· Twitter
· Pintrest
· RSS/XML Feeds
· News Blur
· Yahoo
· Symbaloo

about

· Top Freeware Picks
· Malware Removal
· Geektionary
· Useful Links
· About Us
· Copyright
· Privacy
· Terms of Service
· How to Uninstall

top downloads

1. GS Auto Clicker
2. Macrium Reflect FREE Edition
3. Smart Defrag
4. Visual C++ Redistributable Runtimes AIO Repack
5. Visual C++ Runtime Installer (All-In-One)
6. McAfee Removal Tool (MCPR)
7. MusicBee
8. Rufus
9. K-Lite Mega Codec Pack
10. Sergei Strelec's WinPE
More >>

top reads

Star How to Disable 1-Click Ordering on Amazon (and Avoid Surprise Charges)

Star How to Fix Shallow Paint Layer Depth in Bambu Studio

Star Aviator Betting Game Secrets: Unlock 97% RTP & Triple Your Wins

Star Windows Recall: What It Is, Why Hackers Will Love It, and How to Stay Safe

Star Star Trek Fleet Command Promo Codes: Redeem Codes for Free Shards, Blueprints And Resources

Star How To Use VLC Media Player to Trim Video Clips

Star What Is the $WinREAgent Folder and Can I Delete It?

Star Swear Your Way to Better Search Results

Star How to Get a Dark Start Menu and Taskbar in Windows 10 & 11

Star Enable, Disable, Manage, Delete or Create a System Restore Point


MajorGeeks.Com » News » March 2013 » Why Watering Hole Attacks Work

Why Watering Hole Attacks Work


Contributed by: Email on 03/20/2013 02:29 PM [ comments Comments ]


Information security is littered with bad analogies. And none sounds sillier than a watering hole attack, which plays off the tactic that dominant animals use when stalking food by loitering at a watering hole. Rather than chase their prey, a lion will wait for prey to come to it. Hackers are doing the same thing to a great degree of success. Rather than using a spear phishing email campaign to lure prey to them, hackers are infecting vulnerable sites of a common interest to their targets, and then redirecting them to malware and more badness.

Make no mistake, while watering hole attacks cast a wider net and snare more victims than the attacker wants, these are targeted attacks. Mobile developers at Facebook, Apple and Twitter found out the hard way when their machines were popped by malware hosted on a popular iOS mobile developer forum. Was the attacker after Facebook, Apple and Twitter? Maybe. Or maybe they wanted to own mobile applications and mobile phones on a massive scale?

The question remains unanswered, but one thing is certain: watering hole attacks work. They work because attackers are compromising legitimate websites that for the most part cannot be blacklisted, and are often doing so with zero-day exploits for which there are no antivirus or IDS signatures. Banning mobile developers from surfing to an important resource they need to do their job isn’t a feasible strategy. Telling government officials they cannot use nor contribute to an online foreign policy resource isn’t realistic. Hackers prey on this dynamic, and also understand the shortcomings surrounding secure software development and how difficult it is for IT security to effect change on programmers whose incentives are to push products out the door on time, secure or not.

“How can we train employees to be wary of watering hole sites? It doesn’t make any sense and I can just see why some CISOs are getting frustrated,” said Anup Ghosh, CEO and founder of security company Invincea. “At least with spear phishing, you can blame the user even if it’s not their fault. With watering hole attacks, they user can always say ‘I had to go there for work, what do you want me to do?’”

Most high-profile watering hole attacks have been loosely attributed to nation states, but in a nifty about-face, these well-funded state-sponsored hackers are borrowing techniques from the arena of cybercrime. Watering hole attacks are a riff on drive-by downloads with subtle differences. Drive-by attacks are indiscriminate about their victims. Cybercrime gangs want scale and want it quickly; they want banking credentials and personal information because fraud and identity theft is their game. With watering hole attacks, the end game is espionage. Hackers’ motivations are to steal intellectual property or gain access to sensitive computer systems.

To date, not only have large technology companies such as Facebook, Apple and Twitter been snared at the watering hole, but so have regional banks, activist groups, government foreign policy resource sites, manufacturers, the defense industrial base, and many other companies from varied industries. Hackers are using Java zero-day exploits in their attacks, as well as exploits targeting flaws in Adobe Reader and Flash, or Internet Explorer—all ubiquitous, cross-platform software platforms.

“What amazes me is the general effectiveness of the attack category in general, whether it’s a commodity drive-by or a watering hole, it works and it works well,” said Mike Sconzo, CTO of security consultancy Visible Risk.

Hackers don’t necessarily get a better level of targeting with watering hole attacks, but they do gain a degree of efficiency with these types of attacks. It’s simple to Googledork sites looking for vulnerable versions of web servers to infect, rather than spending time doing reconnaissance on social networks and forums, and building complex profiles of people and the systems they use. Nation state-sponsored attackers certainly have gone to these lengths in the past to cast out phishing messages to initially infect targets. But watering hole attacks such as VOHO and the attacks on the Council of Foreign Relations have removed spear phishing from the equation.

“In today’s world, less and less people are clicking on links they receive in emails, but they are still visiting various websites each day. Phishing is like sending random people poisoned fruit cakes and hoping they eat it, but a watering hole attack is like poisoning a town’s water supply and just waiting for them to take a sip. One could never happen, while the other is only a matter of time,” said Candis Orr, researcher with Stach & Liu. “A successful phishing campaign would require knowledge on what sources the targets usually receive emails from, within which emails do the targets actually receive and click links, and how to spoof an email address to look like it came from one of those sites.”

Experts, however, don’t see this as the end of spear phishing.

“Financially, it makes more sense to use a watering hole attack than spear phishing when you want large profit fast,” said Barry Shteiman, senior security strategist at Imperva. “But when you’re talking intellectual property, then spear phishing makes more sense most of the time because you can target a specific audience rather than just a website.”

Having major companies such as Facebook, Apple and Twitter disclose they fell victim to watering hole attacks shines more light on the problem.

“It creates outrage. When we see Google or Apple compromised and losing intellectual property to other countries, it outrages us that it’s going on,” Invincea’s Ghosh said. “We can start to put pressure on the administration to use diplomacy to fight this. If Ford and GM are compromised for their next-gen auto design, that’s serious business.”






« Justice Department Backs Closing Loophole For Government E-mail Snooping · Why Watering Hole Attacks Work · South Korea: Attacks on the networks of TV broadcasters and banks »




Comments
comments powered by Disqus

MajorGeeks.Com » News » March 2013 » Why Watering Hole Attacks Work

© 2000-2025 MajorGeeks.com
Powered by Contentteller® Business Edition