Back to Glossary

Glossary Term

Watering Hole Attack

An attack that compromises frequently visited, trusted sites to deliver malware to targeted visitors.

1 min read

Share this definition

Post it to your feed or send it to teammates.

What it is

In a watering hole attack, adversaries compromise legitimate websites that a specific organization or demographic frequently visits. Rather than attacking individuals directly, they infect the trusted site with malicious code�such as exploit kits or JavaScript injections�that executes when users visit.

This tactic is common in espionage campaigns, where attackers profile their targets and compromise community forums, vendor portals, or industry-specific resources. Once a user visits the infected site, the attacker can exploit browser vulnerabilities to install malware or steal session tokens.

Why it matters

Watering hole attacks are difficult to detect because they use legitimate infrastructure and trusted domains. They exploit the inherent trust users place in familiar websites and can compromise large groups simultaneously.

How to reduce risk

  • Keep browsers and plugins updated to patch known exploits.
  • Use endpoint protection that detects drive-by downloads.
  • Monitor DNS and network logs for suspicious redirects.
  • Implement web application firewalls (WAFs) to protect your own sites.
  • Share indicators of compromise through threat intelligence networks.