Web Injection Process Used in Watering Hole Attacks
Friday, September 20, 2019 at 00:07
Source: Symantec
1. Attacker profiles victims and the kind of websites they go to.
2. Attacker then tests these websites for vulnerabilities.
3. When the attacker finds a website that he can compromise, he injects JavaScript or HTML, redirecting the victim to a separate site that hosts the exploit code for the chosen vulnerability.
4. The compromised website is now “waiting” to infect the profiled victim with a zero-day exploit, just like a lion waiting at a watering hole.