The investigation is not about a tiger lurking around a source of drinking water to launch a deadly attack but it’s about a recent cyber watering hole attack that was observed on a number of organizations networks. It discusses why and how the watering hole site was compromised, as well as the threat actor group suspected of being responsible for the attack.
Read more here – http://www.contextis.co.uk/research/blog/crouching-tiger-ihs-watering-hole/