From spear phishing to watering holes

Posted by   Virus Bulletin on   Sep 7, 2012

Symantec reports increase in 'watering hole attacks'.

Imagine that for some reason you wanted to gain access to my computer. One thing you could do is send me an email with some malware attached, or a link to a site serving malware. That is called spear phishing.

Spear-phishing is commonly used in targeted attacks; for instance it was used in the attack on security vendor RSA last year. But from the attackers' point of view, they have one downside: they depend on the recipient clicking the link or opening an attachment. If I have a reason to believe I am a likely target of spear phishing, there's a good chance that I simply discard the email, even if the malware used contains zero-day exploits and is not recognized by any anti-malware product.

This is why attackers are increasingly using 'watering hole attacks' (named after watering holes in a desert, to which predators know their victims will eventually head). Rather than send me an email, you can compromise and infect a website I am likely to visit; a site with a local weather forecast, for instance. Security rules rightly tell us not to trust the unknown, but if the site is one I visit regularly, there is no such unknown.

Of course, such attacks take much more of an effort on behalf of the attackers: websites that I am likely to visit need to be identified in the first place and then they need to be probed for vulnerabilities that enable the attackers to gain access to the site. Writing about such attacks, Symantec says sometimes sites are compromised months before the attack takes place. This way, multiple websites can be infected at once, increasing the value of zero-day exploits used in the attack.

Symantec reports a recent increase in such watering hole attacks. In particular, the company writes about a group it calls the 'Elderwood gang' that has been using a number of such attacks to target high-profile organizations, most prominently defence manufacturers in the defence supply chain. The gang have built a platform that enables them to implement zero-day exploits without having to develop code for each new exploit.

Symantec also says it has reason to believe that this gang is linked to the group which in 2009 used the Aurora/Hydraq trojan to attack Google's infrastructure.

The 14-page report on 'the Elderwood project' can be downloaded from Symantec's website here.

Posted on 7 September 2012 by Martijn Grooten

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VB2019 paper: APT cases exploiting vulnerabilities in region-specific software

At VB2019, JPCERT/CC's Shusei Tomonaga and Tomoaki Tani presented a paper on attacks that exploit vulnerabilities in software used only in Japan, using malware that is unique to Japan. Today we publish both their paper and the recording of their…

New paper: Detection of vulnerabilities in web applications by validating parameter integrity and data flow graphs

In a follow-up to a paper presented at VB2019, Prismo Systems researchers Abhishek Singh and Ramesh Mani detail algorithms that can be used to detect SQL injection in stored procedures, persistent cross-site scripting (XSS), and server‑side request…

VB2020 programme announced

VB is pleased to reveal the details of an interesting and diverse programme for VB2020, the 30th Virus Bulletin International Conference.

VB2019 paper: Cyber espionage in the Middle East: unravelling OSX.WindTail

At VB2019 in London, Jamf's Patrick Wardle analysed the WindTail macOS malware used by the WindShift APT group, active in the Middle East. Today we publish both Patrick's paper and the recording of his presentation.

VB2019 paper: 2,000 reactions to a malware attack – accidental study

At VB2019 cybercrime journalist and researcher Adam Haertlé presented an analysis of almost 2000 unsolicited responses sent by victims of a malicious email campaign. Today we publish both his paper and the recording of his presentation.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.