APT TA423 conducted watering hole attacks to distribute ScanBox, a JavaScript-based reconnaissance tool. Researchers identified the campaign targeting victims through compromised websites. ScanBox executes in the browser to harvest keystrokes, system information, and network details before attackers deploy additional payloads.

The attack chain begins when victims visit infected sites. Malicious JavaScript executes automatically, collecting reconnaissance data without user interaction. This information feeds threat actors' targeting decisions for follow-on attacks.

TA423 operates with a focus on espionage objectives. The group targets sectors and regions aligned with Chinese state interests. Watering hole attacks offer scale and persistence. Compromised legitimate websites serve as distribution points, reaching multiple victims through normal browsing.

Defenders must implement content security policies to block unauthorized script execution. Network monitoring should flag ScanBox signatures, including its command-and-control communications. Web filtering systems require updates to identify compromised legitimate sites in the campaign. Organizations should audit their own web properties for unauthorized modifications.

The ScanBox toolkit remains a persistent threat. Its modular design allows TA423 to adapt functionality quickly. Early detection of reconnaissance activity prevents escalation to full compromise.