Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.
How does water holing attack work?
- The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
Web3’s Newest Bait: How Fake AI Platforms Are Hacking Human Trust
🧠 Hackers Are Now Weaponizing Fake AI Platforms
🚨 New social engineering attack targets curiosity – and it’s working.
🎯 These scams mimic legit Web3 AI tools – then hijack your wallet once connected.
⚠️ No red flags. No typos. No shady emails. Just realistic platforms and polished interfaces luring users to trust, click, and fall.
💥 It’s no longer phishing – it’s full-scale interface deception. And it’s scaling.
👨💻 Users are being tricked inside tools they believe are safe – from browser-based AI tools to crypto dashboards.
🔐 The future of phishing? It won’t come by email. It will come by app, dashboard, chatbot, or plugin.
🧠 Security teams must rethink how they train employees to detect deception.
At AUMINT.io, we simulate these advanced attack types – helping teams build real-world reflexes, not false confidence.
🛡️ Cyber resilience starts with realistic, evolving simulation – not check-the-box awareness.
📅 Curious to see it in action? Book a quick session and preview how AUMINT Trident handles real-world deception.
#CISO #CTO #CyberSecurity #Web3Security #AIThreats #SocialEngineering #FraudPrevention #SecurityAwareness #BlockchainRisk #SecurityTraining #PhishingSimulation