A watering hole attack, or strategic website compromise attack, is a hacking technique used to compromise a site that is frequently visited by a particular group of users. The attackers identify the vulnerabilities of that specific website and inject malicious codes into it. This gives attackers access to users’ personal computers and, thereby, their organization. In most cases, a watering hole attack aims for financial benefits, data breaches, and the reputation of the organization.
In the case of watering hole attacks, the attackers target legitimate websites (e.g., Forbes) that are frequented by its employees or other related persons. Potential industries targeted by attackers can include but are not limited to:
Although watering hole attacks are limited, their impact can be significant:
The website of the U.S. Department of Labor (DoL) was hacked in mid-2013 in a watering hole attack. The attackers injected a malicious JavaScript code into the website’s Site Exposure Matrix (SEM) database related to nuclear energy. This redirected visitors to another website hosted with Poison Ivy, a remote access trojan mainly used to attack government organizations, which helped attackers gather information about their targeted systems.
A Chinese group of attackers used a watering hole attack in 2015 to compromise Forbes.com by leveraging zero-day vulnerabilities in Forbes’ “Thought of the day” widget. Although there are millions of visitors to Forbes, only some visitors from the defense and financial industries were infected with the malware.
A group of attackers, known as the Lazarus group, attacked several Polish banks in a watering hole attack. The attackers used the website of the Polish Financial Supervision Authority (KNF) to target the financial institutions. The authorities shut down the entire network of KNF to avoid the spread of malware and to secure the evidence of the attack.
In addition to enterprise-class security systems, there are immediate steps individual employees and IT personnel can take to protect against watering hole attacks.
Attackers primarily look for system or software vulnerabilities. Therefore, the best practice to avoid watering hole attacks is to keep systems and software up-to-date and ensure all security patches are installed as soon as they get published.
Changing the IP address regularly reduces the chances to get exposed to watering hole attacks. Most attackers target the victims based on their IP address. Therefore, change the IP address frequently to mask the employees of organizations that make attackers difficult to track.
Conducting regular network security checks and user access, detailed traffic analysis, and so on helps organizations identify malicious activities. It also helps organizations to prevent their employees from accessing malware-infected websites and automatic downloads of malware toolkits.
Use appropriate VPNs to mask the identity of users and hide their online activities from outsiders. The use of proper firewalls and other software products also helps organizations to protect against watering hole attacks.