Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.Β
How does water holing attack work?
- Β The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
π Free Supply Chain Risk Checkers Youβll Actually Use π
Supply chain attacks are skyrocketing β and a single weak link can cost millions. The good news? There are free tools CISOs can use immediately to monitor suppliers, dependencies, and third-party risks.
Here are the top free supply chain risk checkers:
1οΈβ£ RiskRecon Free Tier β Evaluate vendor security posture and get actionable insights.
π https://www.riskrecon.com/
2οΈβ£ OWASP Dependency-Check β Scans project dependencies for known vulnerabilities.
π https://owasp.org/www-project-dependency-check/
3οΈβ£ Sonatype OSS Index β Identifies vulnerable open-source components in your software supply chain.
π https://ossindex.sonatype.org/
4οΈβ£ CISA Supplier Risk Resources β Free guidance and tools for assessing critical suppliers.
π https://www.cisa.gov/supply-chain
5οΈβ£ Snyk Free Tier β Detects vulnerabilities in open-source dependencies and container images.
π https://snyk.io/
6οΈβ£ WhiteSource Bolt (Free) β Integrated vulnerability scanner for DevOps pipelines.
π https://www.whitesourcesoftware.com/free-developer-tools/
7οΈβ£ CycloneDX Tools β Open-source Software Bill of Materials (SBOM) generation for tracking components.
π https://cyclonedx.org/tools/
β‘ Takeaway: These tools help CISOs spot weaknesses, prioritize vendor mitigation, and reduce supply chain exposure β without waiting for expensive enterprise solutions.
At AUMINT.io, we simulate social engineering attacks targeting suppliers and employees to uncover hidden supply chain risks that purely technical tools miss.
π Want to see your organizationβs hidden weak links? Book a free demo
#SupplyChainSecurity #CISO #CyberSecurity #ThirdPartyRisk #AUMINT