Web Injection Process Used in Watering Hole Attacks

Friday, September 20, 2019 at 00:07
Web Injection Process Used in Watering Hole Attacks

Source: Symantec

1. Attacker profiles victims and the kind of websites they go to.

2. Attacker then tests these websites for vulnerabilities.

3. When the attacker finds a website that he can compromise, he injects JavaScript or HTML, redirecting the victim to a separate site that hosts the exploit code for the chosen vulnerability.

4. The compromised website is now “waiting” to infect the profiled victim with a zero-day exploit, just like a lion waiting at a watering hole. 

Sosial Media

Keep up to date with ours:

Get great deals!

Submit your email, to always get the latest information.