August 30, 2022 Source: Threatpost 2 min read · 574 words

Watering Hole Attacks Push ScanBox Keylogger

Атаки на водопій розповсюджують keylogger ScanBox

Hackers Just Turned Your Favorite Website Into a Spy Tool

Researchers have uncovered an active watering hole attack campaign that's using compromised websites to distribute a sophisticated JavaScript-based reconnaissance tool called ScanBox. This isn't theoretical cybersecurity stuff—this is a real APT cyber attack happening right now, attributed to the advanced persistent threat group TA423, and it's targeting specific victims with precision.

The discovery, first reported by Threatpost, reveals one of the most effective strategies in modern APT cyber security threats: instead of blasting malware to thousands of random targets, TA423 is compromising trusted websites that specific victims actually visit. It's like poisoning the well instead of the water supply.

The Breach

Here's how the attack works in plain terms. TA423 identified websites visited by their intended targets—victims they actually wanted to hit. Then they compromised those sites and injected malicious code. Nothing flashy. Just deadly effective.

When the target visits the compromised website, they unknowingly download ScanBox, a JavaScript-based tool designed to perform reconnaissance. The malware can capture keystrokes, steal credentials, and gather information about the victim's system and network. And because it runs in the browser? It's harder to detect than traditional executable malware.

Watering hole attacks are a hallmark of sophisticated APT attack examples because they require detailed intelligence about victims' habits. It's not random. It's surgical.

Under the Hood

ScanBox itself is particularly nasty because of what it does with such minimal footprint. The keylogger component captures everything typed—passwords, search queries, form submissions. Nothing gets past it.

But here's what makes this APT cyber attack especially dangerous.

The reconnaissance phase gives TA423 exactly what they need to stage a deeper intrusion. They're not stealing your data and running—they're mapping your network, identifying vulnerabilities, and planning their next move. This is how major breaches happen. First reconnaissance. Then lateral movement. Then extraction.

JavaScript-based attacks also exploit a trust problem baked into how we use the web. Most organizations monitor executable files closely. But JavaScript running in a browser context? That often flies under the radar. Frankly, this should have been caught sooner by security filters.

The Fallout

According to Threatpost's reporting, the campaign is still active, which means TA423 is actively harvesting credentials and system information from compromised victims right now.

The real question is: what data has already been stolen?

Victims of ScanBox infections may have had credentials compromised, making them vulnerable to follow-up attacks. Their internal network architecture is now known to threat actors. Their systems have been profiled. The damage extends far beyond the initial keylogging.

And organizations relying on traditional endpoint security might not even know they've been hit. JavaScript reconnaissance tools don't always leave obvious traces.

Protecting Yourself

First: assume this is targeting your organization if your industry or sector deals with sensitive data. Government agencies, defense contractors, financial institutions—TA423 doesn't waste time on random targets.

Implement advanced browser security tools that sandbox JavaScript execution. Deploy network detection systems that catch unusual outbound communication patterns. Monitor for ScanBox's known command-and-control domains—Threatpost's reporting should include indicators of compromise you can feed into your security tools.

Credential rotation isn't optional anymore. If there's even a possibility your organization was compromised, cycle your passwords.

And talk to your web security team about monitoring your own websites for unauthorized modifications. If attackers can compromise third-party sites to target you, they can compromise yours to target others.

Watering hole attacks succeed because they exploit trust. Don't let that trust become your vulnerability.

Read original article →

// FAQ

What is ScanBox and what does the keylogger do?

ScanBox is a JavaScript-based reconnaissance tool deployed by TA423 that functions as a keylogger, capturing keystrokes and credentials while also gathering information about the victim's system and network for staging deeper intrusions.

How do I know if my organization was targeted by this watering hole attack?

Check your web traffic logs for connections to ScanBox command-and-control domains and monitor for unusual browser-based outbound communication. Threatpost's reporting includes indicators of compromise specific to this campaign.

Is this attack only targeting specific industries?

Yes, TA423 uses watering hole attacks to target specific victims through websites they know their intended targets visit, typically government agencies, defense contractors, and other organizations with sensitive data.

Concerned about your project's security? Run an automated pentest with AISEC — fully automated AI-powered scanner. Go to dashboard →