How does a watering-hole attack work? The attacker uses a social situation to smooth talk an individual into revealing sensitive information. O The attacker combs the organization's website for details about key employees, shared there for anyone to read. After finding a vulnerability in a web application that the organization uses regularly, the attacker infects the web application with malware. Mingling with employees, the attacker enters a secured facility from a break room or other gathering area with an exterior door.

icon
Related questions
Question

Do not use AI.

How does a watering-hole attack work?
The attacker uses a social situation to smooth talk an individual into revealing sensitive information.
O The attacker combs the organization's website for details about key employees, shared there for anyone to
read.
O After finding a vulnerability in a web application that the organization uses regularly, the attacker infects the
web application with malware.
O Mingling with employees, the attacker enters a secured facility from a break room or other gathering area
with an exterior door.
Transcribed Image Text:How does a watering-hole attack work? The attacker uses a social situation to smooth talk an individual into revealing sensitive information. O The attacker combs the organization's website for details about key employees, shared there for anyone to read. O After finding a vulnerability in a web application that the organization uses regularly, the attacker infects the web application with malware. O Mingling with employees, the attacker enters a secured facility from a break room or other gathering area with an exterior door.
Expert Solution
steps

Step by step

Solved in 3 steps

Blurred answer