"Watering hole" attacks prove to be more effective alternative to phishing Hacker groups increasingly compromised industry websites in 2013 in an attempt to load malware onto the computers of employees of targeted companies and government agencies, a global threat report found. [Even the tech-savvy are prone to compromise]The so-called “watering hole” tactic was used as a more effective alternative to using email to trick employees into opening a malicious attachment of clicking on a link to an infected website, according to CrowdStrike’s year-in-review study released Tuesday. Compromising the sites frequented by employees raised the infection rate while reducing the amount of work.With email attacks, called phishing, the hackers have to do research on the targeted groups of employees, in order to design a convincing message, Dmitri Alperovitch, co-founder and chief technology officer for CrowdStrike, said. “If you do this for thousands of people that you want to potentially compromise, it takes quite a bit of effort from a human involvement perspective,” he said. “(A watering hole) allows you to scale these operations for compromising a whole slew of targets all at once.” CrowdStrike based its findings on the more than 50 groups it tracked last year, many of which conducted effective watering-hole attacks. Owners of the sites compromised included The Council of Foreign Relations, Capstone Turbine and Napteh Egineering & Development Co. Hacking groups in Russia and China were particularly fond of watering-hole attacks. A Chinese group CrowdStrike called Emissary Panda targeted foreign embassies, while a group called Energetic Bear, which has ties to the Russian government, focused on Western targets within the energy industry. In the past, groups in Russia were more interested in military organizations. Over the last couple of years, their interests have shifted to stealing intellectual property and sensitive documents from Western energy companies. Russia is a major oil producer.“Traditionally, we have seen (economic espionage) from the Chinese and we’ve also started seeing that from the Indians,” Alperovitch said.This year, CrowdStrike expects to see a lot of hacker groups focus on breaking into systems running Windows XP, which Microsoft will no longer support in April. Hackers are expected to take advantage of the absence of regular vulnerability patches with malware targeting previously unknown exploits. As a result, CrowdStrike is predicting a rise in XP infections in the second and third quarters of this year.“You’re going to have a very vulnerable population,” Alperovitch said. “A lot of these machines are in enterprises and a lot them are running point of sale terminals in retailers, so you’re going to have a big problem on your hands.” As of December, Windows XP accounted for 29 percent of the computers accessing the Internet, according to Net Applications. [APT malware NetTraveler learning new tricks]CrowdStrike also expects to see malware creators increasingly encrypt network traffic when communicating with remote servers. In addition, malware is expected to become better at appearing benign in order to bypass sandboxes meant to contain malicious code.Finally, attackers will likely take advantage of major events in designing phishing and watering hole attacks. Such events include the Winter Olympics, the World Cup and the G20 Summit, a gathering of finance ministers and central bank governors from 20 major economies. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe