Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.
How does water holing attack work?
- The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
Why Microsoft’s New Secure Future Initiative Won’t Be Enough Without You
🛡️ Microsoft’s Secure Future Won’t Secure Your People
📢 Microsoft’s new “Secure Future Initiative” is a powerful pivot – stronger engineering, more AI-driven threat detection, tighter controls. But…
🚨 None of it stops a user from clicking the wrong link.
🧠 Social engineering still bypasses the smartest tech. Why? Because humans trust, skip, forget, and fall for what feels safe.
🔐 AUMINT.io’s Trident platform fills the human gap: – Simulates ultra-targeted phishing + impersonation – Rewires reflexes through adaptive training – Shows CISOs where the next breach might start
📊 90% of breaches still involve human behavior. Microsoft can’t fix that. You can.
💬 Book your intro now – before a smart user becomes your weakest link.
#SecureFuture #CISO #HumanFirewall #SecurityAwarenessTraining #SocialEngineering #MicrosoftSecurity #TridentByAUMINT