Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.
How does water holing attack work?
- The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
SquidLoader Malware Strikes: What Every CISO Should Know About This Emerging Threat
🔒 Malware You’ll Never See Coming Is Already Here
🧠 AI-level obfuscation.
🐙 Modular payloads.
💼 Targets finance and ops teams.
Meet SquidLoader – a malware threat so stealthy, even advanced SOC teams struggle to spot it.
👀 Attackers are dropping SquidLoader via legitimate-looking documents. One click, and you’re compromised.
💣 Once inside, it adapts – loading payloads, evading detection, and exploiting users who were never trained for this level of sophistication.
📉 Here’s the twist: most awareness programs train employees for outdated scams.
📈 SquidLoader-style attacks mimic real-world business scenarios with layered deception.
🧪 At AUMINT.io, we simulate advanced threats like these with Trident – our platform that turns employee behavior into predictive defense.
📊 You can now benchmark your team’s response against modern threat vectors like SquidLoader.
⏳ The window for passive awareness training is closing. Fast.
💡 Curious how your team would respond to this attack?
Book a free simulation consult
#CyberSecurity #InfoSec #CISOs #SOCteams #FraudPrevention #SocialEngineering #MalwareThreats #AUMINT