Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.
How does water holing attack work?
- The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
Deepfaked at Home: Why Your Executives Are Now the Weakest Link
🧠 Deepfakes Are Now Targeting Execs at Home
🎯 41% of executives were targeted with deepfakes in 2025
📲 Fake video calls from “CEOs” and “spouses” are tricking teams
🏠 Home networks and smart devices are now enterprise entry points
🔓 Many execs reuse personal passwords at work – attackers know it
❌ Half of companies still don’t train leaders to detect synthetic threats
If your security ends at the office door – your real risks are just beginning.
Cybercriminals are bypassing corporate firewalls and heading straight for the homes of key personnel. And it’s working. They’re blending breached personal data with AI-powered deepfakes to impersonate, manipulate, and break in.
Your organization’s weakest link might be the CEO’s unprotected home router.
It’s time to protect leadership the same way we protect infrastructure.
At AUMINT.io, we help companies extend their perimeter into executive households with tailored simulations, awareness training, and digital hygiene hardening.
Don’t wait for a fake CFO call to cost your real company millions.
Book Your Executive Security Session Now
#ExecutiveProtection #DeepfakeThreats #CISO #CyberSecurity #ThreatIntelligence #AUMINT #SMBSecurity #LeadershipCyberRisk