Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.
How does water holing attack work?
- The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
Why Employee Logins Are Today’s Most Valuable Cyber Currency
🔐 Employee Logins Are Hackers’ Most Valuable Target
🚨 Hackers aren’t just after customer data anymore – your employees’ login credentials are now the key to entire corporate networks.
💡 Once attackers have access, they move silently, escalating privileges and stealing sensitive info without raising alarms.
🧠 Most security tools don’t stop social engineering and phishing that trick employees into handing over credentials.
🎯 AUMINT’s real-world simulations train your teams to spot and stop these attacks before damage is done.
⏳ The question isn’t if your logins will be targeted, but when. Are your people ready?
Secure your workforce with AUMINT and turn your employees into your strongest defense.
#CyberSecurity #SocialEngineering #Phishing #CISO #SecurityAwareness #AUMINT