<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:georss="http://www.georss.org/georss" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" > <channel> <title>Integrity Attacks | Farhad Mofidi</title> <atom:link href="https://www.mofidi.us/jw/category/integrity-attacks/feed" rel="self" type="application/rss+xml" /> <link>https://www.mofidi.us</link> <description>Farhad Mofidi's Personal Website</description> <lastBuildDate>Sun, 02 Apr 2023 18:31:18 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod> hourly </sy:updatePeriod> <sy:updateFrequency> 1 </sy:updateFrequency> <generator>https://wordpress.org/?v=6.7</generator> <image> <url>https://www.mofidi.us/wp-content/uploads/2016/04/cropped-favicon-1-32x32.png</url> <title>Integrity Attacks | Farhad Mofidi</title> <link>https://www.mofidi.us</link> <width>32</width> <height>32</height> </image> <site xmlns="com-wordpress:feed-additions:1">110392034</site> <item> <title>Watering hole attacks: how APT and cyber criminals infiltrate secure infrastructures</title> <link>https://www.mofidi.us/watering-hole-attacks-how-apt-cyber-criminals-secure-infrastructures.html</link> <comments>https://www.mofidi.us/watering-hole-attacks-how-apt-cyber-criminals-secure-infrastructures.html#respond</comments> <dc:creator><![CDATA[Farhad]]></dc:creator> <pubDate>Sun, 02 Apr 2023 18:29:16 +0000</pubDate> <category><![CDATA[Confidentiality Attacks]]></category> <category><![CDATA[Integrity Attacks]]></category> <category><![CDATA[Web Attacks]]></category> <category><![CDATA[APT]]></category> <category><![CDATA[Malware]]></category> <category><![CDATA[NGAV]]></category> <category><![CDATA[Polymorphic Malware]]></category> <category><![CDATA[strategic web compromise]]></category> <category><![CDATA[Watering hole attacks]]></category> <guid isPermaLink="false">https://www.mofidi.us/?p=304</guid> <description><![CDATA[<p>My first encounter with the world of cyber-criminals occurred through a watering hole attack campaign many years ago. I visited a Persian website and discovered that it was downloading malware onto visitors’ browsers. I promptly contacted the site administrator, who informed me that they had no technical knowledge of the issue. It became apparent that… <br /> <a class="read-more" href="https://www.mofidi.us/watering-hole-attacks-how-apt-cyber-criminals-secure-infrastructures.html">Read more</a></p> The post <a href="https://www.mofidi.us/watering-hole-attacks-how-apt-cyber-criminals-secure-infrastructures.html">Watering hole attacks: how APT and cyber criminals infiltrate secure infrastructures</a> first appeared on <a href="https://www.mofidi.us">Farhad Mofidi</a>.]]></description> <content:encoded><![CDATA[<p>My first encounter with the world of cyber-criminals occurred through a watering hole attack campaign many years ago. I visited a Persian website and discovered that it was downloading malware onto visitors’ browsers. I promptly contacted the site administrator, who informed me that they had no technical knowledge of the issue. It became apparent that they were using an outdated CMS with well-known security vulnerabilities, which criminals were exploiting to target specific audiences and spread malware.</p> <p><a href="https://csrc.nist.gov/glossary/term/watering_hole_attack">Watering hole attacks</a> are some of the methods favored by cyber criminals and advanced persistent threat (APTs). In these attacks, cybercriminals use a tactic called “strategic web compromise” (SWC) to gain access to the victim’s organization’s network. By identifying websites frequently visited by target users, an attacker can infect those websites with malware and download it to an unsuspecting users’ device.</p> <p>Malware used in watering hole attacks is designed to evade detection and remain undetected on the target’s device, giving attackers continuous access to sensitive information. This type of attack is of particular concern because it can go undetected for long periods of time, allowing attackers to gather sensitive information over time.</p> <p>One type of commonly used malware in watering hole attacks is polymorphic malware. Polymorphic malware is a type of malicious software designed to constantly change its code and appearance in order to avoid detection by antivirus software and other security measures. This type of malware is particularly dangerous as it can mutate itself into many different forms, making it difficult for traditional antivirus/ anti-malware software to detect and remove it. Polymorphic malware can change its appearance using a variety of methods, including encryption, compression, and randomization.</p> <p>Watering hole attacks are especially dangerous for small businesses, as they are often targeted due to weaker security measures compared to larger enterprises. However, even large organizations and government agencies have fallen victim to water hole attacks.</p> <p>Below are some steps you can take to reduce your risk of becoming a victim of this type of attacks:</p> <ol> <li>Use web filtering: web filtering tools can block access to malicious or unknown websites and webpages. This prevents users from accidentally downloading malware from the watering hole.</li> <li>Use next-generation antivirus (NGAV): NGAV solutions use advanced detection techniques such as machine learning algorithms and behavioral analytics to identify and respond to new and previously unknown threats.</li> <li>Implement endpoint detection and response (EDR): EDR solutions monitor endpoints such as laptops and desktops for suspicious behavior and can respond to threats in real time.</li> <li>Implement Network-based detection and response (NDR): NDR solutions monitor network traffic for suspicious activity and can detect and respond to threats that traditional antivirus solutions may miss.</li> <li>Employ threat intelligence: Threat intelligence services can provide information about emerging threats, including polymorphic malware. You can use this information to identify potential threats and take appropriate action to protect your network</li> <li>Implement a zero trust network: A zero trust network is a security model that assumes that every user and device on the network is a potential threat. Users must be authenticated before accessing resources on the network, and access is restricted to what is necessary.</li> <li>Use network segmentation: Network segmentation helps separate critical systems and sensitive data from the rest of the network. This prevents malware from spreading in the event of a successful attack.</li> </ol>The post <a href="https://www.mofidi.us/watering-hole-attacks-how-apt-cyber-criminals-secure-infrastructures.html">Watering hole attacks: how APT and cyber criminals infiltrate secure infrastructures</a> first appeared on <a href="https://www.mofidi.us">Farhad Mofidi</a>.]]></content:encoded> <wfw:commentRss>https://www.mofidi.us/watering-hole-attacks-how-apt-cyber-criminals-secure-infrastructures.html/feed</wfw:commentRss> <slash:comments>0</slash:comments> <post-id xmlns="com-wordpress:feed-additions:1">304</post-id> </item> </channel> </rss> <!-- Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/ Object Caching 18/118 objects using Memcached Page Caching using Memcached (Page is feed) Database Caching using Memcached (Request-wide modification query) Served from: www.mofidi.us @ 2024-12-04 01:52:47 by W3 Total Cache -->