Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.
How does water holing attack work?
- The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
The 19 Million Dollar Phishing Lesson No Business Can Ignore
🚨 The $19M Phishing Scam Every Business Should Fear
💡 A single phishing email cost a Milford firm 19 million dollars – and now they’re facing a negligence lawsuit.
📉 This wasn’t a sloppy scam. It was a precise, calculated attack where criminals perfectly mimicked trusted contacts. The transfer seemed legitimate… until it was too late.
🛑 The fallout? Vanished funds, broken trust, legal battles, and reputational damage that no insurance can fix.
🔍 Modern phishing isn’t random – it’s targeted, researched, and designed to bypass standard defenses. Spam filters can’t stop it. Firewalls can’t see it.
⚠️ The real weakness? A moment of human trust. Without continuous training, dark web monitoring, and real-time threat detection, even the most secure-looking organization is at risk.
💼 Lawsuits like this prove one thing – prevention isn’t optional. Clients and regulators expect proof of strong, proactive defense measures.
📢 Don’t gamble with your reputation or revenue. Book your AUMINT.io strategy call now and make sure your business never becomes the next headline.
#CyberSecurity #FraudPrevention #CISOs #FinanceLeaders #RiskManagement #PhishingPrevention #DataSecurity #BusinessContinuity