Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.Β
How does water holing attack work?
- Β The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
The Rising CISO: Bridging IT and OT Cybersecurity
π CISOs Now Guarding OT Security
In 2025, over half of organizations now assign OT security to CISOs, up from 16% in 2022. This shift highlights the urgent need for integrated cybersecurity across IT and OT systems.
As OT networks become more connected to IT infrastructure, the potential impact of cyber threats on critical operations escalates. CISOs are now responsible for unifying defenses, leveraging AI-driven analytics, and implementing threat intelligence to prevent disruptions.
Organizations with integrated OT-IT security report up to a 93% reduction in incidents, demonstrating measurable results. Executives and security leaders must embrace this strategic change to safeguard critical assets and ensure operational continuity.
Future-proof your security posture β discover AUMINT.io solutions
.
#CISO #Cybersecurity #OperationalTechnology #ITSecurity #ExecutiveLeadership #EnterpriseRisk #AUMINT