Ticker

6/recent/ticker-posts

Water-Hole Attack Most Dangerous Hacking Attack Ever


This is 20th century and peoples, company and organizations are more aware for cyber security so it's not easy deal to hack anyone devices. But there is still some of the powerful hacking techniques or attacks with able to destroy big companies or organizations and it seems difficult to protect yourself from those attacks. So today am going to introduce you one of the most powerful hacking attack which is used by hackers to gain complete access on there target which is known as Water Holing attacks.

Water-Hole Attack

It is only used by bad hackers or black hat hackers which want to destroy and company or organization or to gain complete access on there servers.

For example if we visit any website to buy any product like amazon or flipkart and then we paid for product or didn't buy anything and decide to close website. After some time when we use any application or any other website we seen the ads related to those product which we searched on amazon or Flipkart. We all face this situation this if because of some to the cookies or data installed in our device by those websites and google able to detect it and show us recommended ads.

This principle is used for water hole attack. Because hacker directly not able to hacker servers so they decide to find a way which helps hacker to find loop hole in security system.

Let us suppose a company or organization have employ to work form there computer and send or receive  data form some other websites. So firstly hacker analyse that websites and make a list of them and then find out which one of the website is have low security or loop hole and then install their malware on that website using web application exploitation techniques (Mostly hackers use Beff XSS Framework for it) . When Next time the employees visit the infected website there system get infected from malware and infect the all computers connected with infected computers.

Now hacker have access to all of the employees computer and the malware have ability to replicate itself and hacker have complete access on the company or organization.

How To Protect !

Protection from this attack is near to impossible but we find out some of the ways which helps in your protection.

Privacy Of Searches

Hide your online activities from others like daily web searches because if hacker not able to find which websites your employees visit daily then hacker didn't have install malware in your systems by third party websites.

Update Security Time To Time 

Update security time to time like update browsers, update firewalls and fix security patches then hackers not able to exploit old vulnerabilities on your systems.

Network Moniter 

If you have big organization or company then hire install network monitoring systems which able to catch suspicious activities in networks prevent from attack.

So if you have any question then feel free to comment below we try to give your our best. I hop this information is helpful for you if found something interesting in our blog then make sure to follow us for future updates. We also have YouTube channel and Instagram Page where we have more amazing stuff you can checkout it from given links. Have a nice day thanks for visit.

Mohit Saran(Hacker's King)