Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.Β
How does water holing attack work?
- Β The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
Machines Inside the Enterprise β The Silent Cybersecurity Threat Few Are Talking About
β οΈ Machines Are the Silent Cybersecurity Risk in 2025
π€― Did you know machine identities now outnumber human users by as much as 20 to 1?
π¨οΈ Printers, IoT devices, HVAC systems, and even forgotten accounts all operate with permanent trust inside enterprises β and attackers are quietly exploiting them.
π Unlike humans, these machines often bypass authentication checks. A single compromised device can act as an invisible backdoor into critical systems.
π€ The real danger: social engineering is now blending with machine manipulation. From fake printer updates to hijacked chatbots, attackers are using machines to trick employees into authorizing breaches.
π‘ This is why resilience requires more than phishing awareness β it demands training that teaches employees to question machine requests just as critically as human ones.
π
AUMINT.ioβs Trident platform helps organizations simulate these hybrid attack scenarios so teams are ready before the silent threat becomes a crisis. Book your intro session here
.
#CISO #CTO #CEO #CyberSecurity #FraudPrevention #ZeroTrust #IdentitySecurity