August 30, 2022 Source: Threatpost 3 min read · 620 words

Watering Hole Attacks Push ScanBox Keylogger

Атаки на водопої поширюють клавіатурний шпигун ScanBox

Researchers Uncover Active Watering Hole Campaign Pushing ScanBox Keylogger

An active watering hole attack campaign is targeting website visitors with malicious JavaScript code designed to steal information before they even realize they've been compromised. According to Threatpost, security researchers have attributed this campaign to APT group TA423, and it's being delivered through a reconnaissance tool called ScanBox.

Here's what makes this particularly nasty: the victims aren't being targeted because they visited a malicious site they knew to avoid. They're being infected while browsing legitimate websites that've been compromised by attackers.

Breaking It Down

Watering hole attacks work like this. You're at a watering hole in the desert. The attackers poison the well itself, knowing their prey will come drink there eventually. In the cyber world, TA423 identified specific websites that their targets frequently visit, then compromised those sites to inject malicious code.

When a victim visits an infected website, they automatically download and execute the ScanBox reconnaissance tool. It's all happening in the background. No suspicious email to click, no malware installer to approve—just visiting what seems like a normal, trustworthy webpage.

The timing of this discovery matters too. Threatpost's reporting came in August 2022, which means this wasn't some theoretical vulnerability or proof-of-concept attack. This was an actual, operational cyber attack campaign actively compromising people right then.

The Technical Side

ScanBox is a JavaScript-based reconnaissance tool. And that's significant because JavaScript runs natively in web browsers—no special permissions needed, no antivirus warnings. The attacker's code can execute directly on the victim's machine to survey their system, check for security software, identify network configuration, and collect other environmental data.

Think of it as reconnaissance before the main invasion.

The malware functions as a keylogger, meaning it captures everything typed on an infected machine. That includes usernames, passwords, search queries, messages—basically any keystroke. The stolen data gets exfiltrated back to the attacker's command and control servers.

What makes this an APT cyber attack—not just a random malware infection—is the sophistication and targeting. APT groups operate with nation-state-level resources and patience. They're selective about targets, methodical about campaigns, and willing to spend months or years maintaining access to high-value systems.

Who's Affected

TA423 appears to focus on specific victim categories based on the websites they compromised. We don't have the complete list of targeted domains or victim organizations from the Threatpost reporting, but the fact that they went through the effort of compromising legitimate websites tells you these aren't random targets.

Anyone visiting a compromised website could've been hit. But the real concern? Organizations and individuals working in sectors that interest nation-state actors. Frankly, if you operate in government, defense, critical infrastructure, or sensitive research, you should assume you were being actively hunted during this campaign.

And here's what stings: watering hole attacks are notoriously difficult to defend against because the malicious content lives on sites you're supposed to trust.

What To Do Now

First, understand that your antivirus might've missed this. JavaScript reconnaissance tools can be crafted to avoid signature-based detection. Run a full system scan with multiple security tools—Malwarebytes, HitmanPro, or similar—not just your primary antivirus.

Second, change your passwords. If ScanBox was logging keystrokes on your machine, your credentials are potentially compromised. Use a machine you're confident is clean to change sensitive passwords.

Third, enable two-factor authentication everywhere that matters. Email, banking, work systems, cloud storage. If attackers have your password but need a second factor, you've just made their job exponentially harder.

Monitor your accounts for suspicious activity. Check for unexpected logins, password reset attempts, or unauthorized access attempts. Your email provider and banking apps usually show recent login locations and devices—review them.

If you work in a sector that interests state-sponsored actors, contact your security team immediately and assume compromise. Recent APT cyber attacks like this one demand rapid incident response, not waiting to see if anything happens.

Read original article →

// FAQ

What is ScanBox and why is it dangerous?

ScanBox is a JavaScript-based reconnaissance tool used by TA423 to gather system information and log keystrokes on infected machines. It's dangerous because it runs directly in web browsers without user knowledge or approval, making it difficult to detect and allowing attackers to steal passwords and sensitive data.

How do I know if I was affected by the TA423 watering hole attack?

You'd need to check your system with specialized security tools like Malwarebytes or HitmanPro, review your browser history for visits to compromised sites, and monitor your accounts for unauthorized access. If you noticed slow system performance or unusual network activity in August 2022, you may have been affected.

What's the difference between this APT cyber attack and regular malware?

APT attacks like TA423's are sophisticated, targeted campaigns typically backed by nation-states with significant resources and patience. Unlike random malware infections, APT groups carefully select victims, use advanced techniques like watering hole compromises, and maintain long-term presence for espionage purposes.

Concerned about your project's security? Run an automated pentest with AISEC — AI-powered scanner with expert verification. Go to dashboard →