Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.
How does water holing attack work?
- The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
🚨 CISOs: Best Free Incident Response Playbooks to Download Today 🚨
When seconds count, having a solid Incident Response (IR) playbook can make all the difference. Yet, many security leaders struggle to find comprehensive, practical, and free resources tailored for today’s evolving threats.
Here’s a curated list of top-tier free IR playbooks every CISO should download now to boost your team’s readiness and resilience:
1️⃣ SANS Incident Handler’s Handbook – A detailed guide to managing security incidents effectively.
https://www.sans.org/reading-room/whitepapers/incident/incident-handlers-handbook-33901
2️⃣ NIST Computer Security Incident Handling Guide (SP 800-61r2) – A foundational standard for federal and private sectors alike.
https://csrc.nist.gov/publications/detail/sp/800-61/rev-2/final
3️⃣ CERT Resilience Management Model (CERT-RMM) – Focuses on managing operational resilience through IR processes.
https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=508839
4️⃣ MITRE ATT&CK Playbooks – Tailor your response tactics based on attacker behaviors and techniques.
https://attack.mitre.org/resources/playbooks/
5️⃣ CISA Incident Response Playbook – Practical steps from the US Cybersecurity and Infrastructure Security Agency.
https://www.cisa.gov/publication/cisa-incident-response-playbook
Each playbook offers unique value to fortify your defense strategy and streamline team coordination during incidents. Download, review, and customize these templates to fit your organization’s risk profile.
Ready to supercharge your incident response capabilities? 🚀 Book a free intro call with AUMINT.io to see how our social engineering simulation tool can enhance your security posture: Schedule here
Save this post and keep these essential resources at your fingertips! 🔐
#CISO #CyberSecurity #IncidentResponse #InfoSec #SecurityLeadership #AUMINT