Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.
How does water holing attack work?
- The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
SaaS Security Threats No One Is Talking About – And How to Fight Back
🧠 SaaS Is the New Phishing Playground – Here’s Why
💥 2025’s cyber attackers are skipping firewalls and walking through your SaaS tools.
🔗 One breached token in Slack. One over-permissioned user in Salesforce. One unsanctioned AI tool pulling data from Drive.
🎯 That’s how modern breaches begin – silently, inside the apps you trust most.
📉 Most orgs lack visibility across their SaaS stack. Even fewer simulate attacks across those tools.
📢 That’s where AUMINT.io comes in.
🧪 We deploy SaaS-native simulations that test user reactions in context – Slack, Teams, Drive, Trello, and more.
💡 Real users. Real mistakes. Real behavior change.
Book your custom SaaS risk walkthrough now
#SaaSSecurity #CyberAwareness #CISO #HumanFirewall #SecurityOps #AUMINT #InsiderThreat #PhishingSimulation