Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.
How does water holing attack work?
- The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
Why Business Leaders Are Sleepwalking Into AI-Powered Cyber Threats
⚠️ Business Leaders Are Underestimating AI Cyber Threats
📉 A major disconnect is forming between executives and their security teams.
🤖 AI is already fueling hyper-realistic phishing, impersonation, and fraud.
🧠 CISOs know it – but many business pros don’t fully grasp how far these risks have evolved.
📩 Today’s attacks use executive tone, deepfake voice, and real company workflows to manipulate employees.
🔍 What’s worse? Traditional training and outdated assumptions still run awareness programs.
🚨 If leadership doesn’t experience how real AI-powered scams feel, they won’t prioritize prevention.
📊 AUMINT.io closes this perception gap with advanced simulations that mirror real-world AI-powered attacks.
🔐 Your brand, people, and bottom line depend on awareness that’s ahead of the threat curve.
Book an AI Simulation With AUMINT
#CyberSecurity #AIThreats #ExecutiveAwareness #SocialEngineering #SecurityLeadership #CISO #HumanRisk #AUMINT