Connect with us

Hi, what are you looking for?


Application Security

Website of Industrial Software Firm Abused for Reconnaissance Mission

Cybercriminals have compromised the website of an industrial company to conduct a watering hole attack with the goal to collect information on the site’s visitors, according to a report.

Cybercriminals have compromised the website of an industrial company to conduct a watering hole attack with the goal to collect information on the site’s visitors, according to a report.

Researchers at AlienVault say they spotted an interesting framework used by the attackers for reconnaissance. The information collected through the framework, which has been dubbed by the attackers “Scanbox,” can be highly useful for future attacks, they said.

The industrial company involved in the attack has not been named, but the security firm revealed that the affected website is related to software used for simulation and system engineering in various industries, including manufacturing, aerospace and automotive.

Once it’s placed on a website, Scanbox, which is a JavaScript file, configures its command and control (C&C) server and starts collecting information on the site’s visitors. The data harvested in the first phase includes referer, user-agent, location, cookies, domain, screen dimensions, operating system and language. The data is encoded, encrypted and sent back to the C&C server. 

Scanbox Cyber ReconIn addition to collecting this basic information, the reconnaissance framework extracts other details by using various plugins. For example, one of these plugins enumerates software installed on the victim’s device, and checks for the presence of Microsoft’s Enhanced Mitigation Experience Toolkit (EMET). Other plugins enumerate versions of Adobe Flash, Adobe Reader, Java and Microsoft Office. Some of the software enumeration techniques used by the framework were analyzed by AlienVault in July.

Another interesting plugin enables the attackers to log keystrokes and capture all the information entered by the victim on the hacked website.

“While the user is browsing the compromised website, all keystrokes are being recorded and sent to the C&C periodically. It will also send keystrokes when the user submits web forms that can potentially include passwords and other sensitive data,” Jaime Blasco, the director of AlienVault Labs said in a blog post.

Blasco believes this is a powerful framework that provides attackers with useful information that could be used in future attacks.

Advertisement. Scroll to continue reading.

While the Scanbox framework is designed for reconnaissance, the malicious actors also seem to have other tools in their arsenal. AlienVault researchers have spotted several Metasploit-produced Java exploits on the same server that hosts Scanbox.

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join security experts as they discuss ZTNA’s untapped potential to both reduce cyber risk and empower the business.


Join Microsoft and Finite State for a webinar that will introduce a new strategy for securing the software supply chain.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Application Security

GitHub this week announced the revocation of three certificates used for the GitHub Desktop and Atom applications.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.