Monday, June 18, 2018

What are the most effective mitigation strategies for watering hole attacks?

Colleagues, cyber criminals believed to be of Chinese origin recently gained access to a range of government resources in Central Asia. This attack was based upon by inserting malicious scripts in the target country’s websites in order to conduct watering hole attacks. Such attacks seek security exploits in which the attacker attempts to corrupt a specific group of end users by infecting websites that a pool of users are known to visit. The goal is to infect a targeted user's computer and gain access to the network at the target's place of employment. Officials attribute the attack to LuckyMouse, a Chinese-speaking actor (aka APT27 and EmissaryPanda). Some of the more effective mitigation efforts include the use of micro visualization, whitelisting risky web content, deploying Malwarebytes, install up-to-date operating systems and loading all available patches for known vulnerabilities. Share your assessment while visiting us today! Lawrence – Cyber Security Defender (https://cybersecuritydefender.blogspot.com/)   

1 comment:

  1. An attention-grabbing discussion is value comment. I feel that you should write more on this topic, it won't be a taboo subject but generally individuals are not enough to talk on such topics. To the next. Cheers real money casino

    ReplyDelete