Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.
How does water holing attack work?
- The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
The Poisoned QR Code: How MFA Became a Weapon
🔐 MFA Is Now the Entry Point – Not the Barrier
🚨 Cybercriminals are now embedding poisoned QR codes into fake login portals and phishing emails.
🧠 They’ve figured out that if they can’t bypass MFA – they’ll make you bypass it for them.
📱 A new wave of attacks targets users scanning what look like legit QR codes to verify logins. But the second they scan – the session is hijacked, and the attacker is in.
🎯 What’s scary? Most security programs don’t even simulate this attack vector.
🔍 This is a massive blind spot. And cybercriminals know it.
🛡️ Forward-leaning CISOs are now pressure-testing MFA workflows using advanced simulations – especially QR-based authentication flows.
💡 AUMINT Trident was built for this moment. We simulate poisoned QR code attacks, track weak spots by department, and deliver customized defenses across your org.
📊 Want to see how your org would respond to a poisoned QR code attack?
👉 Book a walkthrough of AUMINT Trident
#CyberSecurity #CISO #MFA #SocialEngineering #ZeroTrust #SecurityAwareness #QRcodeAttack #EnterpriseSecurity #FraudPrevention #SecurityLeadership #ITOps