{"id":3580,"date":"2014-03-31T13:09:18","date_gmt":"2014-03-31T13:09:18","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=3580"},"modified":"2020-05-06T10:31:35","modified_gmt":"2020-05-06T17:31:35","slug":"operation-vfw-snowman-waterhole-attack-from-u-s-veterans-of-foreign-wars-website","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/community\/operation-vfw-snowman-waterhole-attack-from-u-s-veterans-of-foreign-wars-website\/","title":{"rendered":"Operation VFW Snowman Waterhole Attack from U.S. Veterans of Foreign Wars Website"},"content":{"rendered":"<p>On February 11, a zero-day exploit was discovered targeting systems running fully patched versions of Internet Explorer 9 or 10. \u00a0Malware using this attack was being hosted from the compromised site of the U.S. Veterans of Foreign Wars (VFW) Website, targeting visitors to the site. The attacks seem to be directed at specific targets in the Advanced Persistent Threat, or APT, style commonly attributed to rogue government organizations or other groups with advanced resources.<\/p>\n<h3 id=\"toc-hId--1902368712\">Targets<\/h3>\n<p>Military personnel and others visiting the VFW website using Windows and Internet Explorer 9 or 10 got infected by the malware. The name \u2018Snowman\u2019 comes from the snow storm that struck the Northeast and Washington DC\/Maryland area closing government offices and keeping Dept. of Defense employees home. The attack was launched to coincide with this storm as many veterans in the Washington DC area work for the Dept. of Defense<\/p>\n<h3 id=\"toc-hId--1873739561\">Technical details<\/h3>\n<p>Watering hole attacks target a business, organization, or group of people by injecting the attack code into websites that the target group frequently visits and trusts.<\/p>\n<p>Operation Snowman is a watering hole attack campaign that started by compromising the VFW website and altering its HTML code.<\/p>\n<p>The attackers injected a JavaScript code into the website that created a malicious iFrame. The malicious iFrame then targeted a zero-day bug in Internet Explorer 9 or 10. The bug allows the attackers to bypass two defensive technologies: address space layout randomization (ASLR) and data execution prevention (DEP). The attack, identified by Common Vulnerability Enumeration identifier CVE-2014-0322, installed a backdoor that let the attackers remove data from an infected computer. The malicious JavaScript routine then loaded a Flash object that downloaded a ZxShell backdoor onto the targeted Windows system.<\/p>\n<p>The ZxShell backdoor is publicly available and has been widely used in several attacks linked to cyber espionage operations. In this instance, the ZxShell backdoor attempted to contact the Command and Control (CnC) server located at domain newss.effers.com, which resolved to IP address 118.99.60.142 at the time of discovery.<\/p>\n<p>The mentioned domains and IP addresses have been used in other attacks, specifically Operation DeputyDog and Operation Ephemeral Hydra, suggesting that those attacks were organized by the same group, which has previously targeted U.S. government entities, Japanese firms, law firms and IT companies, among others.<\/p>\n<h3 id=\"toc-hId--1845110410\">How existing security defenses are evaded<\/h3>\n<p>Software often has security vulnerabilities, but users have become savvier about avoiding unknown domains. The watering hole method is meant to bypass this behavioral defense by using trusted websites.<\/p>\n<p>Existing systems do not provide any means for the user to identify a compromised website that used to be trusted. In this case, a previously undiscovered vulnerability, usually referred to as zero-day, was used as the mean to infect the victim systems.<\/p>\n<h3 id=\"toc-hId--1816481259\">\u00a0Infoblox can help protect against this attack<\/h3>\n<h4 id=\"toc-hId--45041773\">GENERAL BEST PRACTICES RECOMMENDATIONS<\/h4>\n<p>Keeping up with patching is one of the best defenses. Keep operating systems and web browsers fully patched, and ensure that third-party patches are applied as soon as possible.<\/p>\n<p>In addition, administrators can ensure that compromised websites hosting malicious content are kept away from end-users by filtering web traffic at the network level. This can be done at URL level or at domain level.<\/p>\n<p>The exploit targets an Internet Explorer releases 9 and 10 vulnerability using Adobe Flash. It will abort if it detects presence of Microsoft\u2019s Experience Mitigation Toolkit (EMET). To avoid infection, install the EMET, upgrade to Internet Explorer 11 and disable Adobe Flash.<\/p>\n<h4 id=\"toc-hId--16412622\">ATTACK-SPECIFIC RECOMMENDATIONS<\/h4>\n<p>Infoblox DNS Firewall is an application run on an Infoblox DNS server. It will disrupt \u00a0communication by not resolving DNS queries for botnets and CnC servers. All resolved DNS queries are compared to a continually updated table of \u2018bad\u2019 domains and IP addresses with which communication should not be allowed. Resolved DNS queries to malicious domains and IP addresses are either blocked or redirected.<\/p>\n<p>Infoblox DNS Firewall blocks resolution to IP address 118.99.60.142. Based on other domains resolving to the same IP 118.99.60.142, the following IPs were identified as potential CnC servers. These IP addresses and domains are also blocked by DNS Firewall:<\/p>\n<ul>\n<li>118.99.60.142<\/li>\n<li>58.64.200.178<\/li>\n<li>58.64.200.179<\/li>\n<li>103.20.192.4<\/li>\n<\/ul>\n<p>The following domains have been linked to the mentioned IPs:<\/p>\n<ul>\n<li>icybin.flnet.org<\/li>\n<li>info.flnet.org<\/li>\n<li>book.flnet.org<\/li>\n<li>me.scieron.com<\/li>\n<li>cht.blankchair.com<\/li>\n<li>ali.blankchair.com<\/li>\n<li>dll.freshdns.com<\/li>\n<li>rt.blankchair.com<\/li>\n<\/ul>\n<p>DNS Firewall Subscription Service updates DNS Firewall servers every 2 hours with updated information on domains and IP addresses (networks) that make up the VFW Snowman infrastructure.<\/p>\n<p>If the Infoblox DHCP and Reporting server are installed, network administrators can pinpoint the infected devices by IP and MAC address, device type (DHCP fingerprinting), Host name (if configured) and DCHP lease history (on\/off network).<\/p>\n<h3 id=\"toc-hId--1730593806\">External sources<\/h3>\n<ul>\n<li><a href=\"http:\/\/www.fireeye.com\/blog\/uncategorized\/2014\/02\/operation-snowman-deputydog-actor-compromises-us-veterans-of-foreign-wars-website.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Operation SnowMan: DeputyDog Actor Compromises US Veterans of Foreign Wars Website<\/a>\u00a0by FireEye<\/li>\n<li><a href=\"http:\/\/blog.emsisoft.com\/2014\/02\/16\/new-internet-explorer-zero-day-attack-operation-snowman\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">New Internet Explorer Zero Day Attack: Operation Snowman<\/a>\u00a0by EMSI Soft<\/li>\n<li><a href=\"http:\/\/www.informationweek.com\/security\/attacks-and-breaches\/snowman-attack-campaign-targets-ie10-zero-day-bug\/d\/d-id\/1113841\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Snowman Attack Campaign Targets IE10 Zero-Day Bug<\/a>\u00a0by Information Week<\/li>\n<li><a href=\"http:\/\/www.infoworld.com\/t\/web-browsers\/internet-explorer-snowman-zero-day-spreading-use-alternative-or-patch-kb-2934088-237200\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Internet Explorer &#8216;SnowMan&#8217; zero-day spreading: Use alternative or patch with KB 2934088<\/a>\u00a0by InfoWorld<\/li>\n<li><a href=\"http:\/\/www.hacksurfer.com\/posts\/operation-snowman-group-continues-series-of-attacks-to-steal-information\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">&#8220;Operation Snowman&#8221; Group Continues Series of Attacks to Steal Information<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>On February 11, a zero-day exploit was discovered targeting systems running fully patched versions of Internet Explorer 9 or 10. \u00a0Malware using this attack was being hosted from the compromised site of the U.S. Veterans of Foreign Wars (VFW) Website, targeting visitors to the site. The attacks seem to be directed at specific targets in [&hellip;]<\/p>\n","protected":false},"author":295,"featured_media":2608,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[16,15],"class_list":{"0":"post-3580","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-community","8":"tag-infoblox","9":"tag-security","10":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Operation VFW Snowman Waterhole Attack from U.S. Veterans of Foreign Wars Website<\/title>\n<meta name=\"description\" content=\"On February 11, a zero-day exploit was discovered targeting systems running fully patched versions of Internet Explorer 9 or 10. \u00a0Malware using this attack was being hosted from the compromised site of the U.S. Veterans of Foreign Wars (VFW) Website, targeting visitors to the site. The attacks seem to be directed at specific targets in the Advanced Persistent Threat, or APT, style commonly attributed to rogue government organizations or other groups with advanced resources.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/community\/operation-vfw-snowman-waterhole-attack-from-u-s-veterans-of-foreign-wars-website\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Operation VFW Snowman Waterhole Attack from U.S. Veterans of Foreign Wars Website\" \/>\n<meta property=\"og:description\" content=\"On February 11, a zero-day exploit was discovered targeting systems running fully patched versions of Internet Explorer 9 or 10. \u00a0Malware using this attack was being hosted from the compromised site of the U.S. Veterans of Foreign Wars (VFW) Website, targeting visitors to the site. The attacks seem to be directed at specific targets in the Advanced Persistent Threat, or APT, style commonly attributed to rogue government organizations or other groups with advanced resources.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/community\/operation-vfw-snowman-waterhole-attack-from-u-s-veterans-of-foreign-wars-website\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-03-31T13:09:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:31:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/image001-3.png\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Infoblox Security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/operation-vfw-snowman-waterhole-attack-from-u-s-veterans-of-foreign-wars-website\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/operation-vfw-snowman-waterhole-attack-from-u-s-veterans-of-foreign-wars-website\\\/\"},\"author\":{\"name\":\"Infoblox Security\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/5f422bb7a06be93cb128df08840ca8bf\"},\"headline\":\"Operation VFW Snowman Waterhole Attack from U.S. Veterans of Foreign Wars Website\",\"datePublished\":\"2014-03-31T13:09:18+00:00\",\"dateModified\":\"2020-05-06T17:31:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/operation-vfw-snowman-waterhole-attack-from-u-s-veterans-of-foreign-wars-website\\\/\"},\"wordCount\":837,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/operation-vfw-snowman-waterhole-attack-from-u-s-veterans-of-foreign-wars-website\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/image001-3.png\",\"keywords\":[\"Infoblox\",\"Security\"],\"articleSection\":[\"Community\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/operation-vfw-snowman-waterhole-attack-from-u-s-veterans-of-foreign-wars-website\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/operation-vfw-snowman-waterhole-attack-from-u-s-veterans-of-foreign-wars-website\\\/\",\"name\":\"Operation VFW Snowman Waterhole Attack from U.S. Veterans of Foreign Wars Website\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/operation-vfw-snowman-waterhole-attack-from-u-s-veterans-of-foreign-wars-website\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/operation-vfw-snowman-waterhole-attack-from-u-s-veterans-of-foreign-wars-website\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/image001-3.png\",\"datePublished\":\"2014-03-31T13:09:18+00:00\",\"dateModified\":\"2020-05-06T17:31:35+00:00\",\"description\":\"On February 11, a zero-day exploit was discovered targeting systems running fully patched versions of Internet Explorer 9 or 10. \u00a0Malware using this attack was being hosted from the compromised site of the U.S. Veterans of Foreign Wars (VFW) Website, targeting visitors to the site. The attacks seem to be directed at specific targets in the Advanced Persistent Threat, or APT, style commonly attributed to rogue government organizations or other groups with advanced resources.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/operation-vfw-snowman-waterhole-attack-from-u-s-veterans-of-foreign-wars-website\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/operation-vfw-snowman-waterhole-attack-from-u-s-veterans-of-foreign-wars-website\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/operation-vfw-snowman-waterhole-attack-from-u-s-veterans-of-foreign-wars-website\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/image001-3.png\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/image001-3.png\",\"width\":660,\"height\":454,\"caption\":\"Could SD-WAN Change IPv6 Adoption in Enterprises?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/operation-vfw-snowman-waterhole-attack-from-u-s-veterans-of-foreign-wars-website\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Community\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/community\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Operation VFW Snowman Waterhole Attack from U.S. Veterans of Foreign Wars Website\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/5f422bb7a06be93cb128df08840ca8bf\",\"name\":\"Infoblox Security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6b1d72646d45388569e0b1577b53b561494422a95e656789193ef414ac7c7027?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6b1d72646d45388569e0b1577b53b561494422a95e656789193ef414ac7c7027?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6b1d72646d45388569e0b1577b53b561494422a95e656789193ef414ac7c7027?s=96&d=blank&r=g\",\"caption\":\"Infoblox Security\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/isecurityteam\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Operation VFW Snowman Waterhole Attack from U.S. Veterans of Foreign Wars Website","description":"On February 11, a zero-day exploit was discovered targeting systems running fully patched versions of Internet Explorer 9 or 10. \u00a0Malware using this attack was being hosted from the compromised site of the U.S. Veterans of Foreign Wars (VFW) Website, targeting visitors to the site. The attacks seem to be directed at specific targets in the Advanced Persistent Threat, or APT, style commonly attributed to rogue government organizations or other groups with advanced resources.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/community\/operation-vfw-snowman-waterhole-attack-from-u-s-veterans-of-foreign-wars-website\/","og_locale":"en_US","og_type":"article","og_title":"Operation VFW Snowman Waterhole Attack from U.S. Veterans of Foreign Wars Website","og_description":"On February 11, a zero-day exploit was discovered targeting systems running fully patched versions of Internet Explorer 9 or 10. \u00a0Malware using this attack was being hosted from the compromised site of the U.S. Veterans of Foreign Wars (VFW) Website, targeting visitors to the site. The attacks seem to be directed at specific targets in the Advanced Persistent Threat, or APT, style commonly attributed to rogue government organizations or other groups with advanced resources.","og_url":"https:\/\/www.infoblox.com\/blog\/community\/operation-vfw-snowman-waterhole-attack-from-u-s-veterans-of-foreign-wars-website\/","og_site_name":"Infoblox Blog","article_published_time":"2014-03-31T13:09:18+00:00","article_modified_time":"2020-05-06T17:31:35+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/image001-3.png","type":"image\/png"}],"author":"Infoblox Security","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Infoblox Security","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/community\/operation-vfw-snowman-waterhole-attack-from-u-s-veterans-of-foreign-wars-website\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/operation-vfw-snowman-waterhole-attack-from-u-s-veterans-of-foreign-wars-website\/"},"author":{"name":"Infoblox Security","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/5f422bb7a06be93cb128df08840ca8bf"},"headline":"Operation VFW Snowman Waterhole Attack from U.S. Veterans of Foreign Wars Website","datePublished":"2014-03-31T13:09:18+00:00","dateModified":"2020-05-06T17:31:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/operation-vfw-snowman-waterhole-attack-from-u-s-veterans-of-foreign-wars-website\/"},"wordCount":837,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/operation-vfw-snowman-waterhole-attack-from-u-s-veterans-of-foreign-wars-website\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/image001-3.png","keywords":["Infoblox","Security"],"articleSection":["Community"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/community\/operation-vfw-snowman-waterhole-attack-from-u-s-veterans-of-foreign-wars-website\/","url":"https:\/\/www.infoblox.com\/blog\/community\/operation-vfw-snowman-waterhole-attack-from-u-s-veterans-of-foreign-wars-website\/","name":"Operation VFW Snowman Waterhole Attack from U.S. Veterans of Foreign Wars Website","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/operation-vfw-snowman-waterhole-attack-from-u-s-veterans-of-foreign-wars-website\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/operation-vfw-snowman-waterhole-attack-from-u-s-veterans-of-foreign-wars-website\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/image001-3.png","datePublished":"2014-03-31T13:09:18+00:00","dateModified":"2020-05-06T17:31:35+00:00","description":"On February 11, a zero-day exploit was discovered targeting systems running fully patched versions of Internet Explorer 9 or 10. \u00a0Malware using this attack was being hosted from the compromised site of the U.S. Veterans of Foreign Wars (VFW) Website, targeting visitors to the site. The attacks seem to be directed at specific targets in the Advanced Persistent Threat, or APT, style commonly attributed to rogue government organizations or other groups with advanced resources.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/operation-vfw-snowman-waterhole-attack-from-u-s-veterans-of-foreign-wars-website\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/community\/operation-vfw-snowman-waterhole-attack-from-u-s-veterans-of-foreign-wars-website\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/community\/operation-vfw-snowman-waterhole-attack-from-u-s-veterans-of-foreign-wars-website\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/image001-3.png","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/image001-3.png","width":660,"height":454,"caption":"Could SD-WAN Change IPv6 Adoption in Enterprises?"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/community\/operation-vfw-snowman-waterhole-attack-from-u-s-veterans-of-foreign-wars-website\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Community","item":"https:\/\/www.infoblox.com\/blog\/category\/community\/"},{"@type":"ListItem","position":3,"name":"Operation VFW Snowman Waterhole Attack from U.S. Veterans of Foreign Wars Website"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/5f422bb7a06be93cb128df08840ca8bf","name":"Infoblox Security","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/6b1d72646d45388569e0b1577b53b561494422a95e656789193ef414ac7c7027?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6b1d72646d45388569e0b1577b53b561494422a95e656789193ef414ac7c7027?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6b1d72646d45388569e0b1577b53b561494422a95e656789193ef414ac7c7027?s=96&d=blank&r=g","caption":"Infoblox Security"},"url":"https:\/\/www.infoblox.com\/blog\/author\/isecurityteam\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3580","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/295"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=3580"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3580\/revisions"}],"predecessor-version":[{"id":3581,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3580\/revisions\/3581"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2608"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=3580"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=3580"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=3580"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}