What is a watering hole attack and how can I defend myself?

If you have any hunting experience or have been in a beer talk with hunting stories  you probably have came across the term “Watering Hole Attack“. In this attack the hunter is covered near an area with a water hole where animals go in order to drink water, feel safe and usually have their guards down and their instincts more relaxed. So they don’t have to track the prey and attack on the go but wait until it comes to it’s fate on it’s own. Very similar to this approach a hacker targets specific end users by infecting frequently visited websites with malware that spreads to the user’s device.

How is it done

The target victim can be an individual or a group of people belonging on an organization or have similar interests like for example have accounts in the same bank.

Watering hole attack
Watering hole attack

The attacker profiles the targets, scanning mostly their social activity,  to determine the type of websites they frequent. These are often messaging boards or general interest sites popular with the intended target. They will look for a known vulnerability on the website, compromise the site, and infect it with their malware before they lie in wait for baited users to attack.

Attackers will even bite users to visit the sites by sending them emails directing them to specific parts of the compromised website. The problem is that often, these emails do not come from the attackers themselves, but through the compromised website’s automatic email notifications and newsletters that go out on a constant basis. This makes detection of the email lures very difficult.

After the visit, typically the user’s machine is transparently compromised via a drive-by download attack that provides no clues to the user that his or her machine has been attacked and corrupted.

The attacker then can use the victims computer either to exploit him, get information, launch other attacks etc.

This makes defending against watering hole attacks quite difficult for organizations. Without protection against these attacks, websites can be infected for months or even years before they are detected.

Known Major Attacks

  • In 2021, threat actors used the “Live Coronavirus Data Map” from the John Hopkins Center for Systems Science and Engineering to spread malware among users nationwide.
  • In 2016, the Canada-based International Civil Aviation Organization (ICAO) was breached with similar methods and spread malware that infected the United Nations (UN) network.
    In 2014, a foreign attack group hacked Forbes.com and used similar strategies to target visitors working in the financial services and defense industries.
  • In 2013, hackers breached the United States Department of Labor website. The attackers used the website to redirect visitors to a malicious site hosting malware.

How to defend

  1. Always use an antivirus and internet security software. If a website is compromised, it wont be long that a web scanning engine will detect it. If you use an internet security software it will warn you regarding the infection.
  2. Use a Virtual Private Network (VPN). A VPN can disguise online activity from external sources, making it harder for attackers to profile you.
  3. Monitor Your Network and Web Traffic. Internet Monitoring your network activity and all web traffic coming from outside can help prevent watering hole attacks. It can identify malicious activity and abnormalities that can indicate an attack.
  4. Always update your system. Watering hole attacks exploit vulnerabilities in your software. Keeping your software up to date it will reduce these potential vulnerabilities.
  5. Treat all automated email as untrusted. Prefer to visit a site your self rather than follow a link on an email.

 

Passionate Archer, Runner, Linux lover and JAVA Geek! That's about everything! Alexius Dionysius Diakogiannis is a Senior Java Solutions Architect and Squad Lead at the European Investment Bank. He has over 20 years of experience in Java/JEE development, with a strong focus on enterprise architecture, security and performance optimization. He is proficient in a wide range of technologies, including Spring, Hibernate and JakartaEE. Alexius is a certified Scrum Master and is passionate about agile development. He is also an experienced trainer and speaker, and has given presentations at a number of conferences and meetups. In his current role, Alexius is responsible for leading a team of developers in the development of mission-critical applications. He is also responsible for designing and implementing the architecture for these applications, focusing on performance optimization and security.