Tuesday, September 26, 2017
Home / Malware / “Watering hole” websites latest attack threat

“Watering hole” websites latest attack threat

Researchers have found that targeted attacks are on the climb, and that these campaigns have been most effective when cyber gangs first set the bait at popular websites and wait for victims to arrive.

Symantec on Tuesday released its “Internet Security Threat Report 2013,” which revealed a 42 percent increase in targeted attacks from 2011 to 2012. The security firm defined these campaigns as tactics that combined social engineering and malware to target specific individuals at companies with the goal of stealing trade secrets or corporate data.

Satnam Narang, security response manager for Symantec, told SCMagazine.com on Tuesday that an espionage campaign dubbed the “Elderwood Project” was a prime example of hackers using so-called “watering hole” tactics – infecting legitimate and frequently visited websites – to broaden their reach and avoid running up against blacklists.

In these scenarios, the website that is infected is not the mark, but merely the launching pad used to seed a targeted victim list with malware when they visit the site.

“It’s a trend that this is becoming a new way of launching these targeted attacks,” Narang said.

Last year, Symantec discovered that a zero-day vulnerability in Internet Explorer was used to compromise visitors to the website for the Council on Foreign Relations, the influential membership group that helps shape U.S. foreign policy.

In its threat report, Symantec also found that targeted attackers were focusing more on small-to-midsize businesses as a vulnerable link in the supply chain. These organizations are attractive targets because they not only carry sensitive data but also often are linked with larger organizations.

In 2011, companies with fewer than 250 employees accounted for 18 percent of targeted attacks, but in 2012 that figure grew to 31 percent of attacks, the report said.

This article originally appeared at scmagazineus.com

About FastFlux

Owner of ZeroSecurity, interested in programming, malware analysis and penetration testing. If you would like to write for the ZeroSecurity team, please use the contact form above.

Check Also

New FastPOS malware targeting Point-of-Sale systems

Experts have disclosed a new category of malware, labeled “FastPOS,” that has the ability to quickly …