浏览器攻击是通过用户访问被篡改网站或恶意广告网络,利用客户端软件漏洞执行恶意代码的攻击技术。攻击者通常注入恶意脚本到合法网站或广告资源中,当用户浏览器加载这些内容时触发漏洞利用链,实现远程代码执行、凭据窃取或横向移动。防御措施包括实施HTTPS流量解密检测、部署Web应用防火墙过滤恶意脚本、监控浏览器进程异常行为,以及维护浏览器与插件的最新版本以修复已知漏洞。
| 效应类型 | 是否存在 |
|---|---|
| 特征伪装 | ✅ |
| 行为透明 | ✅ |
| 数据遮蔽 | ✅ |
| 时空释痕 | ✅ |
通过将恶意代码嵌入合法广告素材、第三方资源库或标准化网络协议,使攻击流量在格式规范、数字证书、传输协议等维度与正常业务流量完全一致。例如恶意广告链式加载技术严格遵循IAB广告标准,第三方资源污染使用合法数字签名,实现攻击行为的表面合法化。
零日漏洞链式触发技术利用未公开漏洞组合突破防御体系,其漏洞利用过程未产生已知特征模式,传统基于特征库匹配的检测机制无法有效识别,形成"无特征、无告警"的攻击穿透效果。
动态恶意负载注入技术采用端到端HTTPS加密传输,结合每会话动态生成的加密密钥,使攻击载荷在传输过程中全程处于密文状态,有效规避中间节点流量解密检测。
通过攻击链的全球化分布式部署(如利用多地CDN节点分发污染资源)和低频触发机制(如仅针对特定时间段访问用户实施攻击),将攻击特征稀释在正常网络流量中,破坏防御系统的时空关联分析能力。
| ID | Name | Description |
|---|---|---|
| G0138 | Andariel |
Andariel has used watering hole attacks, often with zero-day exploits, to gain initial access to victims within a specific IP range.[1][2] |
| G0073 | APT19 |
APT19 performed a watering hole attack on forbes.com in 2014 to compromise targets.[3] |
| G0007 | APT28 |
APT28 has compromised targets via strategic web compromise utilizing custom exploit kits.[4] APT28 used reflected cross-site scripting (XSS) against government websites to redirect users to phishing webpages.[5] |
| G0050 | APT32 |
APT32 has infected victims by tricking them into visiting compromised watering hole websites.[6][7] |
| G0067 | APT37 |
APT37 has used strategic web compromises, particularly of South Korean websites, to distribute malware. The group has also used torrent file-sharing sites to more indiscriminately disseminate malware to victims. As part of their compromises, the group has used a Javascript based profiler called RICECURRY to profile a victim's web browser and deliver malicious code accordingly.[8][9][10] |
| G0082 | APT38 |
APT38 has conducted watering holes schemes to gain initial access to victims.[11][12] |
| G0001 | Axiom | |
| S0606 | Bad Rabbit |
Bad Rabbit spread through watering holes on popular sites by injecting JavaScript into the HTML body or a |
| G0060 | BRONZE BUTLER |
BRONZE BUTLER compromised three Japanese websites using a Flash exploit to perform watering hole attacks.[16] |
| S0482 | Bundlore |
Bundlore has been spread through malicious advertisements on websites.[17] |
| C0010 | C0010 |
During C0010, UNC3890 actors likely established a watering hole that was hosted on a login page of a legitimate Israeli shipping company that was active until at least November 2021.[18] |
| G1012 | CURIUM |
CURIUM has used strategic website compromise to infect victims with malware such as IMAPLoader.[19] |
| G1034 | Daggerfly |
Daggerfly has used strategic website compromise for initial access against victims.[20] |
| G0070 | Dark Caracal |
Dark Caracal leveraged a watering hole to serve up malicious code.[21] |
| G0012 | Darkhotel |
Darkhotel used embedded iframes on hotel login portals to redirect selected victims to download malware.[22] |
| G0035 | Dragonfly |
Dragonfly has compromised targets via strategic web compromise (SWC) utilizing a custom exploit kit.[23][24][25] |
| G1006 | Earth Lusca |
Earth Lusca has performed watering hole attacks.[26] |
| G0066 | Elderwood |
Elderwood has delivered zero-day exploits and malware to victims by injecting malicious code into specific public Web pages visited by targets within a particular sector.[27][28][29] |
| S0531 | Grandoreiro |
Grandoreiro has used compromised websites and Google Ads to bait victims into downloading its installer.[30][31] |
| S0483 | IcedID |
IcedID has cloned legitimate websites/applications to distribute the malware.[32] |
| S0215 | KARAE |
KARAE was distributed through torrent file-sharing websites to South Korean victims, using a YouTube video downloader application as a lure.[9] |
| G0032 | Lazarus Group |
Lazarus Group delivered RATANKBA and other malicious code to victims via a compromised legitimate website.[33][34] |
| G0077 | Leafminer | |
| G0065 | Leviathan | |
| S0451 | LoudMiner |
LoudMiner is typically bundled with pirated copies of Virtual Studio Technology (VST) for Windows and macOS.[37] |
| G0095 | Machete |
Machete has distributed Machete through a fake blog website.[38] |
| G0059 | Magic Hound |
Magic Hound has conducted watering-hole attacks through media and magazine websites.[39] |
| G1020 | Mustard Tempest |
Mustard Tempest has used drive-by downloads for initial infection, often using fake browser updates as a lure.[40][41][42][43] |
| C0016 | Operation Dust Storm |
During Operation Dust Storm, the threat actors used a watering hole attack on a popular software reseller to exploit the then-zero-day Internet Explorer vulnerability CVE-2014-0322.[44] |
| G0040 | Patchwork |
Patchwork has used watering holes to deliver files with exploits to initial victims.[45][46] |
| G0068 | PLATINUM |
PLATINUM has sometimes used drive-by attacks against vulnerable browser plugins.[47] |
| S0216 | POORAIM |
POORAIM has been delivered through compromised sites acting as watering holes.[9] |
| G0056 | PROMETHIUM |
PROMETHIUM has used watering hole attacks to deliver malicious versions of legitimate installers.[48] |
| S0496 | REvil |
REvil has infected victim machines through compromised websites and exploit kits.[49][50][51][52] |
| G0048 | RTM |
RTM has distributed its malware via the RIG and SUNDOWN exploit kits, as well as online advertising network |
| S1086 | Snip3 |
Snip3 has been delivered to targets via downloads from malicious domains.[55] |
| S1124 | SocGholish |
SocGholish has been distributed through compromised websites with malicious content often masquerading as browser updates.[40] |
| G0027 | Threat Group-3390 |
Threat Group-3390 has extensively used strategic web compromises to target victims.[56][57] |
| G0134 | Transparent Tribe |
Transparent Tribe has used websites with malicious hyperlinks and iframes to infect targeted victims with Crimson, njRAT, and other malicious tools.[58][59][60] |
| G0010 | Turla | |
| G0124 | Windigo |
Windigo has distributed Windows malware via drive-by downloads.[63] |
| G0112 | Windshift |
Windshift has used compromised websites to register custom URL schemes on a remote system.[64] |
| G1035 | Winter Vivern |
Winter Vivern created dedicated web pages mimicking legitimate government websites to deliver malicious fake anti-virus software.[65] |
| ID | Mitigation | Description |
|---|---|---|
| M1048 | Application Isolation and Sandboxing |
Browser sandboxes can be used to mitigate some of the impact of exploitation, but sandbox escapes may still exist.[66][67] Other types of virtualization and application microsegmentation may also mitigate the impact of client-side exploitation. The risks of additional exploits and weaknesses in implementation may still exist for these types of systems.[67] |
| M1050 | Exploit Protection |
Security applications that look for behavior used during exploitation such as Windows Defender Exploit Guard (WDEG) and the Enhanced Mitigation Experience Toolkit (EMET) can be used to mitigate some exploitation behavior. [68] Control flow integrity checking is another way to potentially identify and stop a software exploit from occurring. [69] Many of these protections depend on the architecture and target application binary for compatibility. |
| M1021 | Restrict Web-Based Content |
For malicious code served up through ads, adblockers can help prevent that code from executing in the first place. Script blocking extensions can help prevent the execution of JavaScript that may commonly be used during the exploitation process. |
| M1051 | Update Software |
Ensure all browsers and plugins kept updated can help prevent the exploit phase of this technique. Use modern browsers with security features turned on. |
| ID | Data Source | Data Component | Detects |
|---|---|---|---|
| DS0015 | Application Log | Application Log Content |
Firewalls and proxies can inspect URLs for potentially known-bad domains or parameters. They can also do reputation-based analytics on websites and their requested resources such as how old a domain is, who it's registered to, if it's on a known bad list, or how many other users have connected to it before. |
| DS0022 | File | File Creation |
Monitor for newly constructed files written to disk to gain access to a system through a user visiting a website over the normal course of browsing. |
| DS0029 | Network Traffic | Network Connection Creation |
Monitor for newly constructed network connections to untrusted hosts that are used to send or receive data. |
| Network Traffic Content |
Monitor for other unusual network traffic that may indicate additional tools transferred to the system. Use network intrusion detection systems, sometimes with SSL/TLS inspection, to look for known malicious scripts (recon, heap spray, and browser identification scripts have been frequently reused), common script obfuscation, and exploit code. |
||
| DS0009 | Process | Process Creation |
Look for behaviors on the endpoint system that might indicate successful compromise, such as abnormal behaviors of browser processes. This could include suspicious files written to disk, evidence of Process Injection for attempts to hide execution, or evidence of Discovery. |