Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.Β
How does water holing attack work?
- Β The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
The Subtle Snail Recruitment Trap β How Attackers Use Fake HR to Steal Credentials and Persist
π¨ Recruitment-Style Phishing Is the New Front Line
π± Researchers link an Iran-nexus group to recruitment lures that infected 34 devices across 11 organizations, using fake HR profiles to bait targets.
π§© The bait looks real: tailored outreach, plausible interviews, and job documents that contain weaponized ZIPs or signed binaries which deploy loaders.
π§ The payload family MINIBIKE steals credentials, logs keystrokes, and creates persistent backdoors for long-term espionage.
β οΈ These campaigns hide traffic in Azure-hosted C2 and abuse DLL sideloading to evade detection, so standard AV often misses them.
β Quick actions: treat unsolicited job attachments as untrusted; verify recruiter emails and LinkedIn profiles; sandbox any job-related archive before opening.
π For security teams β simulate recruitment lures, tighten endpoint rules against DLL sideloading, and monitor cloud egress for anomalous C2.
π SEO note: use keywords like job, recruiter, LinkedIn, credential theft, MINIBIKE to surface this threat to practitioners and hiring teams.
π AUMINT.io helps design simulations and detection playbooks that mirror this recruitment workflow. Book a 15-minute intro and get a tailored risk checklist: https://calendly.com/aumint/aumint-intro
#JobSeekers #CISO #HR #ITSecurity #AUMINT #ThreatIntel #RecruitingSecurity