Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.
How does water holing attack work?
- The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
Big Game Hunting: Why Hackers Are Targeting the Titans of Industry
🧨 The $100M Question: Who’s Hunting Your Company?
🔍 Cybercriminals aren’t going wide anymore. They’re going deep.
🎯 Big Game Hunting is the new strategy – and enterprises are in the crosshairs. Hackers are skipping random targets and going after the biggest, richest, and most interconnected players in tech, finance, and retail.
💣 And it’s not just data theft – it’s operational sabotage, supply chain destruction, and executive impersonation on an elite level.
💼 CISOs and Security Leaders: Your biggest risk might not be a firewall misconfig – it could be a vendor with weak email hygiene or an assistant who clicked the wrong file.
👥 Social engineering is the point of entry. Every. Single. Time.
🧠 That’s why human-centric simulation and behavior-based training matter more than ever.
🚨 This isn’t optional anymore – it’s the difference between readiness and ruin.
💡 Want to see how the AUMINT Trident system protects your org from advanced social engineering? Book your free walkthrough today
👇 Read the full breakdown + see how leaders are defending against Big Game Hunting
#CyberSecurity #CISOs #TechLeaders #VendorRisk #SocialEngineering #EnterpriseSecurity #AUMINT #HumanFirewall #RiskManagement #CyberResilience