Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.Β
How does water holing attack work?
- Β The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
π Free Botnet Tracker Sites Revealing Global Attack Trends π
Botnets continue to power a huge percentage of cyberattacks worldwide, from DDoS campaigns to malware distribution. For CISOs, tracking them early is crucial β and several free resources make this possible.
Here are the top free botnet tracker sites:
1οΈβ£ Abuse.ch β Feodo, Zeus Tracker β Tracks active banking malware and botnets.
π https://abuse.ch
2οΈβ£ Shadowserver Foundation β Provides free daily reports on botnet infections globally.
π https://www.shadowserver.org/
3οΈβ£ Spamhaus Botnet Threat Feeds β Lists IPs and domains associated with botnet activity.
π https://www.spamhaus.org/
4οΈβ£ Zeus Tracker (via Abuse.ch) β Specific tracking for Zeus botnet variants.
π https://zeustracker.abuse.ch/
5οΈβ£ Botvrij.eu β Real-time botnet detection and reporting for European networks.
π https://botvrij.eu/
6οΈβ£ Malwaredomainlist.com β Monitors botnet command-and-control servers and malicious domains.
π https://www.malwaredomainlist.com/
7οΈβ£ Emerging Threats (ET Open) β Network threat intelligence including botnet activity feeds.
π https://rules.emergingthreats.net/
β‘ Using these free trackers, CISOs can spot emerging threats, update defenses, and strengthen SOC responses before attacks escalate.
At AUMINT.io, we complement technical monitoring with simulations of social engineering attacks that exploit human weaknesses, revealing the full picture of organizational exposure.
π Want to see how your employees respond to botnet-driven phishing or social attacks? Book a free demo
#BotnetTracking #CISO #CyberSecurity #ThreatIntelligence #AUMINT