Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.
How does water holing attack work?
- The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
Why Hackers Love Small Businesses – And How to Shut the Door
🛑 SMEs Are Now the #1 Cyberattack Target
📊 43% of all cyberattacks target small and medium-sized businesses – and the majority start with one simple tactic: social engineering.
📬 A fake invoice.
🧑💻 A spoofed vendor.
📁 A calendar invite with malware.
Most employees won’t spot it – until it’s too late.
🔒 The problem isn’t just tech – it’s human vulnerability at scale.
🧠 AUMINT.io runs real-world social engineering simulations to identify who’s most at risk, what they click on, and how attackers would exploit your people.
📈 Our data shows that within just 30 days of simulated exposure, SMEs reduce human-driven risk by over 55% – without hiring a single extra security head.
💡 It’s not about fear – it’s about clarity, action, and control.
📆 Want to see how your team would respond under pressure?
Book your AUMINT.io briefing here
#SMBSecurity #CyberAwareness #SocialEngineering #CISO #FounderTips #HumanFirewall #PhishingSimulation #FraudPrevention