Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.
How does water holing attack work?
- The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
The Rising Threat of Phishing – How Clever Scammers Exploit Trust
🚨 Phishing Attacks Are Getting Smarter
💡 Recent campaigns targeting Booking.com users demonstrate how attackers exploit trust and familiarity to steal credentials.
⚠️ Personalized emails referencing recent bookings make it nearly impossible to distinguish legitimate communications from malicious ones.
🔍 Human behavior remains the primary vulnerability – clicking links or providing credentials opens doors for attackers.
🔥 AUMINT Trident simulates real-world phishing attacks, providing insights and ongoing training to strengthen your human firewall.
📅 Don’t wait until it’s too late – protect your workforce and sensitive data now: https://calendly.com/aumint/aumint-intro
.
#CISO #CyberSecurity #SocialEngineering #FraudPrevention #HumanFactor #EmployeeAwareness #Phishing