Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.
How does water holing attack work?
- The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
Ransomware’s New Era: Why Smart CISOs Are Rewriting Their Budgets in 2025
🧠 Ransomware Budgets Are Up – But Are You Spending Smart?
💣 CISOs are increasing ransomware budgets – but here’s the twist:
Most of that money still goes toward old-school defenses that attackers already know how to bypass.
🔍 Meanwhile, cybercriminals are skipping firewalls and going straight for your team – using AI-powered social engineering, deepfake calls, and vendor impersonation to walk into your network.
🧩 The real question in 2025 isn’t how much you’re spending – it’s what you’re investing in.
📊 Smart orgs are focusing budgets on human-layer defense:
Continuous phishing simulations
Real-time employee risk dashboards
Personalized training based on attack patterns
💡 Because ransomware doesn’t breach your tech – it breaches your people.
🚀 That’s where AUMINT Trident comes in.
Our platform gives CISOs live insight into human attack surfaces – and how to lock them down before real attackers find them.
🔗 Book a free AUMINT intro call – and see how fast you can upgrade your ransomware resilience.
#CyberSecurity #CISOs #Infosec #FraudPrevention #HumanRisk #SocialEngineering #SecurityAwareness #AUMINT #Trident #ITSecurity #SOC #Ransomware #BudgetStrategy