Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.
How does water holing attack work?
- The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
Voice Clones & Mobile Phishing Are Not Tomorrow’s Threats – They’re Already Here
📱 Voice Clones + Mobile Phishing = The Perfect Cyber Storm
🧠 What if your CEO called… and it wasn’t really them?
💬 What if your employee clicked a Slack message from “you” – but it was AI-crafted fraud?
📲 These threats aren’t theoretical anymore. They’re happening. Right now.
👂 Deepfake voice attacks now take just 3 seconds of audio.
🧬 They’re using real human tone, urgency, and timing to bypass logic.
📡 Mobile phishing is now spreading through SMS, WhatsApp, LinkedIn, even Slack – where employees feel safest.
🔥 Most orgs aren’t simulating these risks.
🚫 Inbox training doesn’t cut it anymore.
🔐 Traditional email filters can’t detect what never hits the inbox.
🎯 AUMINT Trident is changing that:
Executive impersonation awareness
Real-world mobile phishing simulations
Human risk dashboards CISOs actually use
🎥 Think your team is ready?
Book a 20-min simulation preview – let them face what’s actually coming.
#CyberSecurity #SocialEngineering #CISOs #SecurityAwareness #AIThreats #FraudPrevention #TridentSimulations #AUMINT #RiskManagement #VoiceDeepfakes #MobilePhishing