Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.
How does water holing attack work?
- The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
🖥 Free Browser Isolation Tools Changing Security Overnight 🖥
Browser isolation has quietly become one of the most effective defenses against phishing, drive-by malware, and malicious scripts. The best part? You don’t always need to pay enterprise prices to start testing it.
Here are free or open-source browser isolation tools CISOs should know:
1️⃣ Bromite – A Chromium-based browser with built-in ad/JS blocking and strong isolation controls.
🔗 https://www.bromite.org
2️⃣ Qubes OS Disposable VMs – Open-source OS where every browser session runs in an isolated VM.
🔗 https://www.qubes-os.org
3️⃣ Firejail – Linux sandboxing utility to run Firefox/Chromium in hardened isolation.
🔗 https://firejail.wordpress.com
4️⃣ Whonix with Tor Browser – VM-based browser isolation that anonymizes and separates browsing activity.
🔗 https://www.whonix.org
5️⃣ OpenBSD unveil/pledge (with Firefox/Chromium) – Security frameworks to restrict what the browser can access.
🔗 https://www.openbsd.org
6️⃣ Island (Community Edition) – App and browser isolation for mobile endpoints.
🔗 https://island.oasisfeng.com
7️⃣ Browser in a Box (by Sirrix/BSI) – Open-source hardened virtualization of browser sessions.
🔗 https://www.sirrix.com
⚡Takeaway: CISOs don’t need million-dollar budgets to reduce browser-borne risks. Starting with free browser isolation is like giving your endpoints a hazmat suit.
At AUMINT.io, we go further – simulating the exact phishing lures and malicious links attackers use to test if employees would click in the first place. Because isolation helps, but awareness changes outcomes.
🔗 Want to see how your employees handle simulated browser-borne attacks? Book a free demo
#BrowserIsolation #CyberSecurity #CISO #ThreatPrevention #AUMINT