{"id":96681,"date":"2019-09-10T12:27:32","date_gmt":"2019-09-10T19:27:32","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=96681"},"modified":"2025-06-02T01:04:24","modified_gmt":"2025-06-02T08:04:24","slug":"how-visiting-a-trusted-site-could-infect-your-employees","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-visiting-a-trusted-site-could-infect-your-employees\/","title":{"rendered":"How Visiting a Trusted Site Could Infect Your Employees"},"content":{"rendered":"<h2>The Artful and Dangerous Dynamics of Watering Hole Attacks<\/h2>\n<p>A group of researchers recently published findings of an\u00a0<a href=\"https:\/\/securingtomorrow.mcafee.com\/other-blogs\/mcafee-labs\/apple-ios-attack-underscores-importance-of-threat-research\/\" target=\"_blank\" rel=\"noopener noreferrer\">exploitation of multiple iPhone vulnerabilities<\/a>\u00a0using websites to infect final targets. The key concept behind this type of attack is the use of trusted websites as an intermediate platform to attack others, and it\u2019s defined as a watering hole attack.<\/p>\n<h2>How Does it Work?<\/h2>\n<p>Your organization is an impenetrable fortress that has implemented every single cybersecurity measure. Bad actors are having a hard time trying to compromise your systems. But what if the weakest link is not your organization, but a third-party? That is where an \u201c<em>island hopping\u201d<\/em> attack can take apart your fortress.<\/p>\n<p><strong><em>\u00a0\u201cIsland hopping\u201d was a military strategy aimed to concentrate efforts on strategically positioned (and weaker) islands to gain access to a final main land target.<\/em><\/strong><\/p>\n<p>One relevant instance of \u201cisland hopping\u201d is a watering hole attack. A watering hole attack is motivated by an attackers\u2019 frustration. If they cannot get to a target, maybe they can compromise a weaker secondary one to gain access to the intended one? Employees in an organization interact with third-party websites and services all the time. It could be with a provider, an entity in the supply chain, or even with a publicly available website. Even though your organization may have cutting edge security perimeter protection, the third parties you interact with may not.<\/p>\n<p>In this type of attack, bad actors start profiling employees to find out what websites\/services they usually consume. What is the most frequented news blog? Which flight company do they prefer? Which service provider do they use to check pay stubs? What type of industry is the target organization in and what are the professional interests of its employees, etc.?<\/p>\n<p>Based on this profiling, they analyze which one of the many websites visited by employees is weak and vulnerable. When they find one, the next step is compromising this third-party website by injecting malicious code, hosting malware, infecting existing\/trusted downloads, or redirecting the employee to a phishing site to steal credentials. Once the site has been compromised, they will wait for an employee of the target organization to visit the site and get infected, sometimes pushed by an incentive such as a phishing email sent to the employees. Sometimes this requires some sort of interaction, such as the employee using a file upload form, downloading a previously trusted PDF report or attempting to login on a phishing site after a redirection from the legitimate one. Finally, bad actors will move laterally from the infected employee device to the desired final target(s).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96682\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/09\/Watering-Hole-Attack-Dynamics.png\" alt=\"\" width=\"1681\" height=\"673\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/Watering-Hole-Attack-Dynamics.png 1681w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/Watering-Hole-Attack-Dynamics-300x120.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/Watering-Hole-Attack-Dynamics-768x307.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/Watering-Hole-Attack-Dynamics-1024x410.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/Watering-Hole-Attack-Dynamics-1249x500.png 1249w\" sizes=\"auto, (max-width: 1681px) 100vw, 1681px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 1: Watering Hole Attack Dynamics<\/em><\/p>\n<p>Victims of a watering hole attack are not only the final targets but also strategic organizations that are involved during the attack chain. As an example, a watering hole attack was discovered in March 2019, targeting member states of the United Nations by compromising the International Civil Aviation Organization (ICAO) as intermediate target<a href=\"#_ftn1\" name=\"_ftnref1\">[1]<\/a>. Because the ICAO was a website frequented by the intended targets, it got compromised by exploiting vulnerable servers. Another example from last year is a group of more than 20 news and media websites that got compromised as intermediate targets to get to specific targets in Vietnam and Cambodia<a href=\"#_ftn2\" name=\"_ftnref2\">[2]<\/a>.<\/p>\n<h2>Risk analysis<\/h2>\n<p>Because this kind of attack relies on vulnerable but trusted third-party sites, it usually goes unnoticed and is not easily linked to further data breaches. To make sure this potential threat is being considered in your risk analysis, here are some of the questions you need to ask:<\/p>\n<ul>\n<li>How secure are the websites and services of the entities I interact with?<\/li>\n<li>Are the security interests of third parties aligned with mine? (Hint: probably not! You may be rushing to patch your web server but that does not mean a third-party site is doing the same).<\/li>\n<li>What would be the impact of a watering hole attack for my organization?<\/li>\n<\/ul>\n<p>As with every threat, it is important to analyze both the probability of this threat as well as how difficult it would be for attackers to implement it. This will vary from organization to organization, but one generic approach is to analyze the most popular websites. When checking the top one million websites around the world, it is interesting to note that around 60%<a href=\"#_ftn3\" name=\"_ftnref3\">[3]<\/a> of these are using Content Management Systems (CMSs) such as WordPress, Joomla or Drupal.<\/p>\n<p>This creates an extra challenge as these popular CMSs are statistically more likely to be present in an organization\u2019s network traffic and, therefore, are more likely to be targeted for a watering hole attack. It is not surprising then that dozens of vulnerabilities on CMSs are discovered and exploited every month (around 1000 vulnerabilities were discovered in the last two years for just the top 4 CMSs<a href=\"#_ftn4\" name=\"_ftnref4\">[4]<\/a>). What is more concerning is that CMSs are designed to be integrated with other services and extended using plugins (more than 55,000 plugins are available as of today). This further expands the attack surface as it creates the opportunity of compromising small libraries\/plugins being used by these frameworks.<\/p>\n<p>Consequently, CMSs are frequently targeted by watering hole attacks by exploiting vulnerabilities that enable bad actors to gain control of the server\/site, modifying its content to serve a malicious purpose. In some advanced scenarios, they will also add fingerprinting scripts to check the IP address, time zone and other useful details about the victim. Based on this data, bad actors can automatically decide to let go when the victim is not an employee of the desired company or move further in the attack chain when they have hit the jackpot.<\/p>\n<h2>Defending against watering hole attacks<\/h2>\n<p>As organizations harden their security posture, bad actors are being pushed to new boundaries. Therefore, watering hole attacks are gaining traction as these allows bad actors to compromise intermediate (more vulnerable) targets to later get access to the intended final target. To help keep your organization secure against watering hole attacks, make sure you are including web protection. McAfee Web Gateway can help provide additional defense against certain class of attacks even when the user is visiting a site that\u2019s been compromised by a watering hole attack, with behavior emulation that aims to\u00a0<a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/forms\/gated-form-thanks.html?docID=ffed1af34cabbf55e43d46e3cd3f77f7\" target=\"_blank\" rel=\"noopener noreferrer\">prevents zero-day malware<\/a>\u00a0in milliseconds as traffic is processed. You may also want to:<\/p>\n<ul>\n<li>Build a <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/security-awareness\/cloud\/what-is-zero-trust.html\">Zero Trust model<\/a>, especially around employees visiting publicly available websites, to make sure that even if a watering hole attack is targeting your organization, you can stop it from moving forward.<\/li>\n<li>Regularly check your organization\u2019s network traffic to identify vulnerable third-party websites that your employees might be exposed to.<\/li>\n<li>Check the websites and services exposed by your organization\u2019s providers. Are these secure enough and properly patched? If not, consider the possibility that these may become intermediate targets and apply policies to limit the exposure to these sites (e.g. do not allow downloads if that is an option).<\/li>\n<li>When possible, alert providers about unpatched web servers, CMS frameworks or libraries, so they can promptly mitigate the risk.<\/li>\n<\/ul>\n<p>Dealing with watering hole attacks requires us to be more attentive and to carefully review the websites we visit, even if these are cataloged as trusted sites. By doing so, we will not only mitigate the risk of watering hole attacks, but also steer away from one possible pathway to data breaches.<\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\">[1]<\/a> <a href=\"https:\/\/securityaffairs.co\/wordpress\/81790\/apt\/icao-hack-2016.html\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/securityaffairs.co\/wordpress\/81790\/apt\/icao-hack-2016.html<\/a><\/p>\n<p><a href=\"#_ftnref2\" name=\"_ftn2\">[2]<\/a> <a href=\"https:\/\/www.scmagazine.com\/home\/security-news\/for-the-last-few-months-the-threat-group-oceanlotus-also-known-as-apt32-and-apt-c-00-has-been-carrying-out-a-watering-hole-campaign-targeting-several-websites-in-southeast-asia\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.scmagazine.com\/home\/security-news\/for-the-last-few-months-the-threat-group-oceanlotus-also-known-as-apt32-and-apt-c-00-has-been-carrying-out-a-watering-hole-campaign-targeting-several-websites-in-southeast-asia\/<\/a><\/p>\n<p><a href=\"#_ftnref3\" name=\"_ftn3\">[3]<\/a> \u201cUsage of content management systems\u201d, <a href=\"https:\/\/w3techs.com\/technologies\/overview\/content_management\/all\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/w3techs.com\/technologies\/overview\/content_management\/all<\/a><\/p>\n<p><a href=\"#_ftnref4\" name=\"_ftn4\">[4]<\/a> \u201cThe state of web application vulnerabilities in 2018\u201d, <a href=\"https:\/\/www.imperva.com\/blog\/the-state-of-web-application-vulnerabilities-in-2018\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.imperva.com\/blog\/the-state-of-web-application-vulnerabilities-in-2018\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Artful and Dangerous Dynamics of Watering Hole Attacks A group of researchers recently published findings of an\u00a0exploitation of multiple&#8230;<\/p>\n","protected":false},"author":945,"featured_media":95572,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[5235],"class_list":["post-96681","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Visiting a Trusted Site Could Infect Your Employees | McAfee Blog<\/title>\n<meta name=\"description\" content=\"The Artful and Dangerous Dynamics of Watering Hole Attacks A group of researchers recently published findings of an\u00a0exploitation of multiple iPhone\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Visiting a Trusted Site Could Infect Your Employees | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"The Artful and Dangerous Dynamics of Watering Hole Attacks A group of researchers recently published findings of an\u00a0exploitation of multiple iPhone\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-visiting-a-trusted-site-could-infect-your-employees\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-10T19:27:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-02T08:04:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/06\/Picture1-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"974\" \/>\n\t<meta property=\"og:image:height\" content=\"650\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"German Lancioni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"German Lancioni\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-visiting-a-trusted-site-could-infect-your-employees\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-visiting-a-trusted-site-could-infect-your-employees\/\"},\"author\":{\"name\":\"German Lancioni\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/69a7dc77931bd98b62360e756f118584\"},\"headline\":\"How Visiting a Trusted Site Could Infect Your Employees\",\"datePublished\":\"2019-09-10T19:27:32+00:00\",\"dateModified\":\"2025-06-02T08:04:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-visiting-a-trusted-site-could-infect-your-employees\/\"},\"wordCount\":1271,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-visiting-a-trusted-site-could-infect-your-employees\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/06\/Picture1-2.png\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-visiting-a-trusted-site-could-infect-your-employees\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-visiting-a-trusted-site-could-infect-your-employees\/\",\"name\":\"How Visiting a Trusted Site Could Infect Your Employees | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-visiting-a-trusted-site-could-infect-your-employees\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-visiting-a-trusted-site-could-infect-your-employees\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/06\/Picture1-2.png\",\"datePublished\":\"2019-09-10T19:27:32+00:00\",\"dateModified\":\"2025-06-02T08:04:24+00:00\",\"description\":\"The Artful and Dangerous Dynamics of Watering Hole Attacks A group of researchers recently published findings of an\u00a0exploitation of multiple iPhone\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-visiting-a-trusted-site-could-infect-your-employees\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-visiting-a-trusted-site-could-infect-your-employees\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-visiting-a-trusted-site-could-infect-your-employees\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/06\/Picture1-2.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/06\/Picture1-2.png\",\"width\":974,\"height\":650,\"caption\":\"laptop with a glitching screen\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-visiting-a-trusted-site-could-infect-your-employees\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"How Visiting a Trusted Site Could Infect Your Employees\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/69a7dc77931bd98b62360e756f118584\",\"name\":\"German Lancioni\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/19a0b8ba8f10c36cf18be06a72ac6084\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/German-150x150.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/German-150x150.png\",\"caption\":\"German Lancioni\"},\"description\":\"German Lancioni is Chief AI Scientist for the CTO Office and leads multiple data science teams working on the next generation of AI &amp; ML based threat protection. Holding more than 45 patents, German's passion for innovation is applied to the design of cost-effective solutions to proactively mitigate cyber-attacks using a diverse set of data-driven technologies. With two MS in Cybersecurity &amp; Data Science, several publications, vast teaching and mentoring experience and love for open-source technology, German is committed to protecting our customers at scale.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/german-lancioni-9a642517\/\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/german-lancioni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Visiting a Trusted Site Could Infect Your Employees | McAfee Blog","description":"The Artful and Dangerous Dynamics of Watering Hole Attacks A group of researchers recently published findings of an\u00a0exploitation of multiple iPhone","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"How Visiting a Trusted Site Could Infect Your Employees | McAfee Blog","og_description":"The Artful and Dangerous Dynamics of Watering Hole Attacks A group of researchers recently published findings of an\u00a0exploitation of multiple iPhone","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-visiting-a-trusted-site-could-infect-your-employees\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2019-09-10T19:27:32+00:00","article_modified_time":"2025-06-02T08:04:24+00:00","og_image":[{"width":974,"height":650,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/06\/Picture1-2.png","type":"image\/png"}],"author":"German Lancioni","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"German Lancioni","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-visiting-a-trusted-site-could-infect-your-employees\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-visiting-a-trusted-site-could-infect-your-employees\/"},"author":{"name":"German Lancioni","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/69a7dc77931bd98b62360e756f118584"},"headline":"How Visiting a Trusted Site Could Infect Your Employees","datePublished":"2019-09-10T19:27:32+00:00","dateModified":"2025-06-02T08:04:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-visiting-a-trusted-site-could-infect-your-employees\/"},"wordCount":1271,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-visiting-a-trusted-site-could-infect-your-employees\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/06\/Picture1-2.png","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-visiting-a-trusted-site-could-infect-your-employees\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-visiting-a-trusted-site-could-infect-your-employees\/","name":"How Visiting a Trusted Site Could Infect Your Employees | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-visiting-a-trusted-site-could-infect-your-employees\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-visiting-a-trusted-site-could-infect-your-employees\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/06\/Picture1-2.png","datePublished":"2019-09-10T19:27:32+00:00","dateModified":"2025-06-02T08:04:24+00:00","description":"The Artful and Dangerous Dynamics of Watering Hole Attacks A group of researchers recently published findings of an\u00a0exploitation of multiple iPhone","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-visiting-a-trusted-site-could-infect-your-employees\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-visiting-a-trusted-site-could-infect-your-employees\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-visiting-a-trusted-site-could-infect-your-employees\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/06\/Picture1-2.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/06\/Picture1-2.png","width":974,"height":650,"caption":"laptop with a glitching screen"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-visiting-a-trusted-site-could-infect-your-employees\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"How Visiting a Trusted Site Could Infect Your Employees"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/69a7dc77931bd98b62360e756f118584","name":"German Lancioni","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/19a0b8ba8f10c36cf18be06a72ac6084","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/German-150x150.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/German-150x150.png","caption":"German Lancioni"},"description":"German Lancioni is Chief AI Scientist for the CTO Office and leads multiple data science teams working on the next generation of AI &amp; ML based threat protection. Holding more than 45 patents, German's passion for innovation is applied to the design of cost-effective solutions to proactively mitigate cyber-attacks using a diverse set of data-driven technologies. With two MS in Cybersecurity &amp; Data Science, several publications, vast teaching and mentoring experience and love for open-source technology, German is committed to protecting our customers at scale.","sameAs":["https:\/\/www.linkedin.com\/in\/german-lancioni-9a642517\/"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/german-lancioni\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/96681","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/945"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=96681"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/96681\/revisions"}],"predecessor-version":[{"id":214804,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/96681\/revisions\/214804"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/95572"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=96681"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=96681"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=96681"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=96681"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}