SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
CYBER SECURITY 201:
WATERING HOLE
ATTACKS
Brought to you by
Cyber criminals are seeing fewer results
from spear phishing attacks because
users are getting smarter about email
Instead of chasing their prey, these
cyber criminals set a trap and wait for
the prey to come to them
See how it works >
Attackers target an organization1
2
3
4
Use tracking tools to find sites employees use
Plant malware on these sites
Identify vulnerabilities
5 Exploit is delivered to the target machine
HOW IT WORKS
5 Access targeted information
FIND TARGET 	
  
Cybercriminals identify a target organization, but
may not be able to attack head-on due to
hardened security.
?
STEP 1
!
FIND THE SITES THEY USE
These attackers use common internet tracking tools like
AddThis and KISSMetrics to identify sites frequently
visited by employees of their target company
STEP 2
PLANT MALWARE
Then, they plant malware on these
sites and wait for users to visit.
STEP 3
1
IDENTIFY VULNERABILITIES
Malicious content scans user machines for
exploitable vulnerabilities like outdated anti-virus
and browsers. The user’s computer phones home to
the attacker with vulnerabilities.
STEP 4
1
EXPLOIT
EXPLOIT DELIVERED
The exploit is delivered to the target machine.
STEP 5
ACCESS TARGET INFORMATION	
  
Steal intellectual property or gain
access to sensitive information
Insert malware into the source code of
a company like Apple or Facebook
Steal financial data to commit fraud
or sell the information to criminals
STEP 6
Third party web analytics and tracking services know
which websites people visit and which links they click
Legitimate websites are used effectively to deliver
malware because they aren’t blacklisted
Zero day vulnerabilities, undetectable by anti-virus,
are exploited by sophisticated and well-funded
criminals such as the Elderwood group
WHY IT WORKS
Identify and block the tracking services that are
monitoring the activity of your employees
PROTECTION TIP 1
Use browser
plug-ins that block
HTTP redirects
PROTECTION TIP 2
Enable automatic
updates for web
browsers
PROTECTION TIP 3
Maintain visibility over all tracking services in use to
identify and block new services
PROTECTION TIP 4
GET MORE DETAILS & TIPS
Download the 4-Step Guide to
Cloud Data Security to learn about
the new attack vectors & how to
protect your company
http://bit.ly/4StepGuide
Brought to you by !
DOWNLOAD THE GUIDE

Weitere ähnliche Inhalte

Andere mochten auch

Internet of Things - October 2013 - Chandna
Internet of Things - October 2013 - ChandnaInternet of Things - October 2013 - Chandna
Internet of Things - October 2013 - Chandna
Asheem Chandna
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibm
Sergio Loureiro
 
Internet of things - Frantic
Internet of things - FranticInternet of things - Frantic
Internet of things - Frantic
Miika Puputti
 

Andere mochten auch (9)

The Cloud in 2015: Predictions from Greylock and Sequoia
The Cloud in 2015: Predictions from Greylock and SequoiaThe Cloud in 2015: Predictions from Greylock and Sequoia
The Cloud in 2015: Predictions from Greylock and Sequoia
 
Internet of Things - October 2013 - Chandna
Internet of Things - October 2013 - ChandnaInternet of Things - October 2013 - Chandna
Internet of Things - October 2013 - Chandna
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibm
 
Internet of things - Frantic
Internet of things - FranticInternet of things - Frantic
Internet of things - Frantic
 
Cloud Security Alliance - Guidance
Cloud Security Alliance - GuidanceCloud Security Alliance - Guidance
Cloud Security Alliance - Guidance
 
16 Inspirational Quotes From the Late, Great Steve Jobs
16 Inspirational Quotes From the Late, Great Steve Jobs16 Inspirational Quotes From the Late, Great Steve Jobs
16 Inspirational Quotes From the Late, Great Steve Jobs
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Waterhole Attack
Waterhole AttackWaterhole Attack
Waterhole Attack
 
Firewalls
FirewallsFirewalls
Firewalls
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Watering Hole Attacks

  • 1. CYBER SECURITY 201: WATERING HOLE ATTACKS Brought to you by
  • 2. Cyber criminals are seeing fewer results from spear phishing attacks because users are getting smarter about email
  • 3. Instead of chasing their prey, these cyber criminals set a trap and wait for the prey to come to them See how it works >
  • 4. Attackers target an organization1 2 3 4 Use tracking tools to find sites employees use Plant malware on these sites Identify vulnerabilities 5 Exploit is delivered to the target machine HOW IT WORKS 5 Access targeted information
  • 5. FIND TARGET   Cybercriminals identify a target organization, but may not be able to attack head-on due to hardened security. ? STEP 1
  • 6. ! FIND THE SITES THEY USE These attackers use common internet tracking tools like AddThis and KISSMetrics to identify sites frequently visited by employees of their target company STEP 2
  • 7. PLANT MALWARE Then, they plant malware on these sites and wait for users to visit. STEP 3
  • 8. 1 IDENTIFY VULNERABILITIES Malicious content scans user machines for exploitable vulnerabilities like outdated anti-virus and browsers. The user’s computer phones home to the attacker with vulnerabilities. STEP 4
  • 9. 1 EXPLOIT EXPLOIT DELIVERED The exploit is delivered to the target machine. STEP 5
  • 10. ACCESS TARGET INFORMATION   Steal intellectual property or gain access to sensitive information Insert malware into the source code of a company like Apple or Facebook Steal financial data to commit fraud or sell the information to criminals STEP 6
  • 11. Third party web analytics and tracking services know which websites people visit and which links they click Legitimate websites are used effectively to deliver malware because they aren’t blacklisted Zero day vulnerabilities, undetectable by anti-virus, are exploited by sophisticated and well-funded criminals such as the Elderwood group WHY IT WORKS
  • 12. Identify and block the tracking services that are monitoring the activity of your employees PROTECTION TIP 1
  • 13. Use browser plug-ins that block HTTP redirects PROTECTION TIP 2
  • 14. Enable automatic updates for web browsers PROTECTION TIP 3
  • 15. Maintain visibility over all tracking services in use to identify and block new services PROTECTION TIP 4
  • 16. GET MORE DETAILS & TIPS Download the 4-Step Guide to Cloud Data Security to learn about the new attack vectors & how to protect your company http://bit.ly/4StepGuide Brought to you by ! DOWNLOAD THE GUIDE