Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.
How does water holing attack work?
- The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
Silent Social Engineering: The Attack That Slips Past Your Security Systems
🔒 Silent Attacks Are Beating Your Security Stack
📉 Cybercriminals are no longer sending obvious phishing emails.
They’re watching your workflows.
They’re mimicking your tone.
They’re slipping into your team’s blind spots – and they’re not being caught.
💡 This new wave of silent social engineering doesn’t need malware or credentials. It just needs one distracted click, one unquestioned approval, one “routine” email.
🧠 These attacks look like normal business. That’s what makes them lethal.
They bypass tools and outsmart humans – unless you’re testing for them.
🎯 CISOs and security leaders: This is now the most overlooked breach vector of 2025.
💬 If you’re relying on awareness training or generic phishing tests, your defense is already outdated.
🛡️ AUMINT Trident simulates these attacks in your live environment, identifies weaknesses, and reinforces defense – tailored to how your people actually behave.
⚠️ Your systems won’t alert you. Your team won’t notice. But attackers already know how to exploit it.
Want to see how your org would perform under real-world silent social engineering pressure?
👉 Book your exclusive AUMINT session now
#CyberSecurity #CISOs #HumanRisk #SocialEngineering #MidMarketSecurity #SecurityAwareness #InfosecLeaders #MSSP #AUMINT