August 30, 2022 Source: Threatpost 2 min read · 575 words

Watering Hole Attacks Push ScanBox Keylogger

Атаки на водопої поширюють keylogger ScanBox

Security researchers just uncovered something nasty lurking on legitimate websites. APT group TA423 is running an active watering hole attack campaign that injects the ScanBox keylogger into compromised sites, turning everyday browsing into a potential infection vector for unsuspecting visitors.

This isn't theoretical. This is happening right now.

The Breach

According to Threatpost, the campaign represents a textbook example of how APT cyber attacks have evolved beyond targeted spear-phishing into something far more insidious. Instead of emails, the attackers compromised legitimate websites and turned them into malware delivery mechanisms. Anyone visiting these poisoned sites risked infection—no need for a suspicious attachment or a phishing link.

The victims? We don't know the full scope yet. That's actually part of what makes watering hole attacks so dangerous. The attackers cast a wide net, hitting anyone who visits a compromised site. Could be employees of a specific organization. Could be journalists. Could be security researchers. The beauty of it—from the attacker's perspective—is the indiscriminate nature of the initial compromise.

TA423 isn't a household name, but this particular APT cyber security incident shows they're operating with real sophistication and infrastructure.

Under the Hood

ScanBox is the delivery mechanism here, and it's a toolkit designed for reconnaissance and keylogging. Once installed, it captures everything: keystrokes, screen activity, browsing history. It's essentially turning your browser into a surveillance device.

The malware operates silently in the background.

What makes this specific APT attack examples noteworthy is how it exploited the trust we place in websites. Your browser tells you a site is safe. You click around. Meanwhile, malicious JavaScript is executing in the background, establishing persistence, exfiltrating data. The victim never knows. Not immediately, anyway.

And here's where cyber attack symptoms become relevant—most users won't notice anything wrong at first. Maybe the browser runs a touch slower. Maybe there's occasional unusual network activity. But ScanBox doesn't announce itself. It doesn't crash your system. It just watches and reports back to the attacker's infrastructure.

The Fallout

This is where the real damage compounds. Once ScanBox establishes itself, the attacker has keylogger access to credentials, emails, messages, banking information—anything typed into that browser. They're essentially sitting in the room with you, watching everything you do.

The apt vulnerability here isn't in a specific software package. It's in the entire supply chain of web traffic. Even well-maintained sites with security teams can be compromised if an attacker finds the right entry point.

Organizations that had employees browsing these compromised sites are now potentially dealing with credential theft, data exfiltration, and compromised internal networks. The breach didn't happen through your firewall. It happened through your browser. And frankly, that's a problem most corporate security teams are still struggling to address.

Protecting Yourself

First: run a full malware scan. Now. If you've visited websites in the last few months, don't assume you're clean. Use reputable antivirus software and consider a secondary scanner for confirmation.

Second, change your passwords. Everywhere. Especially financial accounts, email, and corporate systems. If ScanBox captured your credentials, the attackers have them. Don't give them time to use them.

Third, enable multi-factor authentication on critical accounts. This doesn't stop keyloggers from capturing your password, but it stops attackers from accessing your accounts even if they have it.

Fourth, consider how you browse. Browser extensions that block malicious scripts, DNS-level filtering services, and regular security updates aren't optional anymore. They're table stakes in the current threat environment.

The real question isn't whether watering hole attacks will continue. They will. The question is whether you're ready when one lands on a site you visit every day.

Read original article →

// FAQ

What is ScanBox and how does it steal data?

ScanBox is a keylogging and reconnaissance tool deployed via JavaScript on compromised websites. It captures keystrokes, screenshots, browsing history, and other user activity without the victim's knowledge, transmitting the data back to attacker-controlled servers.

How do I know if I've been infected with ScanBox from a watering hole attack?

Cyber attack symptoms may include slightly slower browser performance, unusual network traffic, or login credential compromise. However, ScanBox operates silently, so the most reliable detection is running a full malware scan with updated antivirus software and checking for unauthorized account access.

What is TA423 and why is this APT group significant?

TA423 is a tracked APT group known for sophisticated attack campaigns. This particular incident demonstrates their capability to compromise legitimate websites and deploy advanced malware, making them a serious threat to both individual users and organizations whose employees browse compromised sites.

Concerned about your project's security? Run an automated pentest with AISEC — AI-powered scanner with expert verification. Go to dashboard →