Spring Statement 2025: What it means for your business
Learn about the announcements made by the government in the 2025 Spring Statement and what businesses need to do now.
In this tech insight, we look at what a watering hole attack is, some examples of such attacks, and how businesses can defend against this threat.
A watering hole attack is a targeted, ‘supply chain,’ cyber-attack strategy, similar to spear phishing. With this strategy, the attacker identifies a website that’s frequented by users of a targeted organisation, or entire sector. The attacker then infects the website(s) with malware and identifies weaknesses in the main target’s cyber-security. The attacker then manipulates the ‘watering hole’ site to deliver that malware, such as a Remote Access Trojan (RAT), so that it can exploit these weaknesses.
When a member of the target organisation’s device becomes infected (like drinking from a poisoned watering hole, hence the name) in a way that the target will not notice (also known as ‘drive-by’), the attacker can then gain access to the infected device. This can, in turn, enable the attacker to access the target organisation’s network
The goal(s) of this strategy, as with other strategies is/are to steal personal information, banking details, and intellectual property, and/or to conduct espionage. Also, it can enable the attacker to access corporate systems and assets, and potentially gain further details for even more cyber-attacks.
Examples of watering hole attacks include:
Ways that you can protect your business from watering hole attacks include:
This is broadly a supply-chain-related attack (web resources) where instead of actively hacking or sending phishing emails, the criminals set traps for unsuspecting victims to walk into. In this respect, it is less obvious for businesses to spot. The first step is recognising and raising awareness of the threat. Following normal security good practice is always helpful plus some additional measures in this case such as identifying, regularly inspecting and monitoring websites that are most visited by employees and focusing on what additional malware protection can be added to employees’ browsers and devices. With an increasing number of more complex and inventive attack methods, many businesses are shifting to a complete ‘Zero Trust’ approach for their IT security. A more data-centred rather than ‘moat and castle’ view of IT security gives companies greater holistic control and reduces the potential for the kind of gaps that cybercriminals can exploit with strategies like watering hole attacks.
For IT support and Cyber Security guidance, please call Paradise Computing on 01604 655900 or send us a message using our online contact form.
Learn about the announcements made by the government in the 2025 Spring Statement and what businesses need to do now.
In today's digital age, securing your work systems is crucial, but it's equally important to protect your personal email accounts. One of the most effective ways to enhance your email security is by enabling two-factor authentication (2FA).
SIM swap fraud is becoming increasingly prevalent, allowing scammers to intercept calls and texts, including one-time security passcodes used for two-factor authentication.