Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.
How does water holing attack work?
- The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
🔒 CISOs: Must-Have Free Cybersecurity Tools in 2025 🔒
The cybersecurity landscape keeps evolving, and so should your toolkit. But high-quality tools don’t have to drain your budget.
Here’s a handpicked list of must-have free tools every CISO should explore in 2025 to protect, monitor, and respond effectively:
1️⃣ Wazuh – Open-source SIEM, log analysis, and endpoint monitoring.
https://wazuh.com/
2️⃣ OSQuery – SQL-like queries to monitor endpoint security in real time.
https://osquery.io/
3️⃣ Nmap – Network discovery and vulnerability scanning made simple.
https://nmap.org/
4️⃣ Nikto2 – Web server scanning for dangerous files and outdated software.
https://github.com/sullo/nikto
5️⃣ TheHive Project – Collaborative incident response platform for fast investigations.
https://thehive-project.org/
6️⃣ MISP (Malware Information Sharing Platform) – Collect, store, and share threat intelligence.
https://www.misp-project.org/
7️⃣ GRR Rapid Response – Remote live forensics framework for endpoints.
https://github.com/google/grr
8️⃣ Security Onion – Linux distro packed with monitoring, detection, and threat hunting tools.
https://securityonionsolutions.com/
9️⃣ Trivy – Free container vulnerability scanner for Docker and Kubernetes.
https://aquasecurity.github.io/trivy/
🔟 MITRE ATT&CK Navigator – Visualize attacker tactics and techniques to improve defense strategy.
https://attack.mitre.org/
These tools provide a strong foundation for building a robust cybersecurity posture while staying cost-efficient.
Want to uncover human risks that tech can’t see? AUMINT.io runs real-world social engineering simulations to reveal hidden vulnerabilities in your workforce.
📅 Explore with a free intro call: Schedule here
💾 Save this post and start upgrading your 2025 cybersecurity toolkit today!
#CISO #CyberSecurityTools #OpenSourceSecurity #ThreatDetection #AUMINT