Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.
How does water holing attack work?
- The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
The 10 Brands Cybercriminals Love – And How to Stop Them
🛑 These 10 Brands Are Fueling the Latest Phishing Storm
📌 Microsoft. Google. Amazon. DHL. Apple.
They’re not being hacked – they’re being weaponized.
📨 Cybercriminals are using our most trusted brands as bait.
🧠 It works because our brains associate these names with legitimacy – not danger.
⚠️ Employees are clicking. They’re submitting credentials. They’re opening the door wide.
🔍 The top 10 most impersonated brands in phishing attacks today?
Microsoft
Google
Amazon
LinkedIn
Adobe
Apple
Facebook
DHL
Instagram
WhatsApp
💣 That’s not just a trend – it’s a strategy.
Attackers are now laser-focused on one thing: trust.
👁️ Most simulations today don’t test this. They don’t recreate the real-world pressure and brand mimicry your team is actually up against.
🎯 That’s where AUMINT.io comes in.
Our platform builds recurring simulations that mimic these exact phishing lures – testing real reactions, not checkbox knowledge.
🔒 Don’t wait until your team clicks.
Protect them before it happens.
💬 Read the full breakdown and book a live walkthrough:
https://calendly.com/aumint/aumint-intro
#Cybersecurity #PhishingPrevention #CISO #SecurityAwareness #EmployeeTraining #AUMINT #SecurityLeaders #FraudPrevention