Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.
How does water holing attack work?
- The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
🔐 CISOs: Free Resources for Implementing Data Loss Prevention (DLP) 🔐
Protecting sensitive data is a top priority, but deploying an effective DLP program can feel overwhelming – especially with limited budgets.
Luckily, there are excellent free resources designed to help CISOs plan, implement, and optimize DLP without costly licensing.
Here’s a curated list of top free DLP resources every CISO should explore:
1️⃣ CISA Data Protection Toolkit – Practical templates and guides to jumpstart your DLP strategy.
https://www.cisa.gov/data-protection
2️⃣ Microsoft DLP Policies Guide (M365) – Step-by-step instructions for setting up native DLP in Microsoft 365 environments.
https://docs.microsoft.com/en-us/microsoft-365/compliance/data-loss-prevention-policies
3️⃣ GitHub Open-Source DLP Tools – A collection of scripts and lightweight tools for data discovery and monitoring.
https://github.com/topics/data-loss-prevention
4️⃣ NIST Special Publication 800-171 – Controls and best practices to safeguard controlled unclassified information.
https://csrc.nist.gov/publications/detail/sp/800-171/rev-2/final
5️⃣ Data Loss Prevention Framework by OWASP – Best practices for developers and security teams to build DLP into applications.
https://owasp.org/www-project-data-protection/
6️⃣ Google Workspace DLP Resources – Free guides to configure DLP in Google environments.
https://support.google.com/a/answer/7669608
7️⃣ The Privacy Rights Clearinghouse Data Protection Guide – Clear explanations of data protection principles and practical steps.
https://privacyrights.org/consumer-guides/data-protection
Implementing DLP is more than tech – it’s people, process, and policy.
Want to test your team’s susceptibility to accidental or intentional data leaks? AUMINT.io’s social engineering simulations highlight human risks that DLP tools can’t see.
📅 Explore how: Book a free intro call
🗂️ Save this post and strengthen your data protection efforts today!
#CISO #DataLossPrevention #DLP #CyberSecurity #InfoSec #AUMINT