Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.
How does water holing attack work?
- The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
76% of Android Apps Can Be Hacked With This 6-Second Trick – Why CISOs Should Care
⚠️ 76% of Android Apps Can Be Hacked – Here’s How
🔍 A zero-permission app can hijack your taps, steal data, and even wipe your device. No overlays. No alerts. No chance to notice.
🔥 This is TapTrap – an animation-driven attack that works on Android 15, bypassing all current defenses.
✔ Exploits a 6-second attack window caused by a system flaw.
✔ Grants camera, location, and notification access without consent.
✔ Escalates to device admin for full control.
✔ Extends to web clickjacking, compromising browsers and MFA flows.
📊 Our findings:
✅ 99,705 apps analyzed
✅ 76.3% vulnerable
✅ 100% of users in our study failed to detect it
Enterprise takeaway? This is a CISO issue. A single compromised phone can leak sensitive data, expose authentication codes, and break compliance.
👉 Want to see how this works and what defenses actually stop it?
Book your free TapTrap security briefing today.
#CyberSecurity #Android #MobileSecurity #CISO #CTO #RiskManagement