Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.
How does water holing attack work?
- The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
🗺 7 Free Threat Maps CISOs Should Bookmark Today 🗺
Seeing cyber attacks unfold in real time changes how you think about defense. Threat maps give CISOs a powerful visual overview of attack activity worldwide – helping teams stay alert, informed, and prepared. Best part? These tools are free.
Here are 7 threat maps worth bookmarking:
1️⃣ Kaspersky Cyberthreat Real-Time Map – Global visualization of malware and phishing.
https://cybermap.kaspersky.com/
2️⃣ FireEye (Trellix) Threat Map – Tracks malicious traffic across regions.
https://threatmap.trellix.com/
3️⃣ Check Point Threat Map – Attack origins and targets updated live.
https://threatmap.checkpoint.com/
4️⃣ Fortinet Threat Map – High-volume global attack telemetry.
https://threatmap.fortiguard.com/
5️⃣ DDoS Attack Map by NETSCOUT – Real-time global DDoS tracking.
https://www.netscout.com/ddos-attack-map
6️⃣ Bitdefender Threat Map – Malware, phishing, and spam attack data.
https://threatmap.bitdefender.com/
7️⃣ Threatbutt Map (satirical yet insightful) – A different take on visualizing attacks.
https://threatbutt.com/map/
🌍 These maps won’t replace intel platforms, but they’re powerful for awareness, briefings, and stakeholder communication.
At AUMINT.io, we help CISOs go beyond watching attacks – by simulating how attackers target employees directly with phishing, vishing, and deepfake tactics.
🔗 Curious how your org would look on a threat map of human factor attacks? Let’s build one together: Book a demo
#ThreatIntelligence #CISO #CyberSecurity #IncidentResponse #AUMINT