Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.Β
How does water holing attack work?
- Β The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
π Free Open-Source Honeypots Exposing Real Attacks Right Now π
Honeypots give CISOs a unique view into attacker behavior β and the best part? Several powerful solutions are completely free and open-source. Hereβs a curated list to start deploying today:
1οΈβ£ Cowrie β SSH and Telnet honeypot that logs brute-force attacks and shell interaction.
π https://github.com/cowrie/cowrie
2οΈβ£ Dionaea β Captures malware targeting vulnerable services and downloads.
π https://github.com/DinoTools/dionaea
3οΈβ£ Glastopf β Web application honeypot for detecting and logging exploit attempts.
π https://github.com/mushorg/glastopf
4οΈβ£ Honeyd β Create virtual hosts to emulate entire networks and trap attackers.
π https://github.com/DataSoft/Honeyd
5οΈβ£ Snort + Honeywall β IDS combined with honeypot monitoring to detect network attacks.
π https://www.snort.org/
6οΈβ£ Conpot β ICS/SCADA honeypot to expose attacks on critical infrastructure protocols.
π https://github.com/mushorg/conpot
7οΈβ£ Thug β Low-interaction client honeypot for tracking web-based exploits.
π https://github.com/bishopfox/thug
8οΈβ£ Modern Honey Network (MHN) β Centralized honeypot management framework for multiple sensors.
π https://github.com/pwnlandia/mhn
9οΈβ£ T-Pot β All-in-one honeypot platform combining multiple honeypots with dashboards.
π https://github.com/dtag-dev-sec/t-pot
β‘ Deploying these allows CISOs to observe live attacks, study tactics, and improve defenses before attackers hit production systems.
At AUMINT.io, we go beyond technology β simulating how attackers exploit the human layer to complement technical insights, ensuring your people are as prepared as your systems.
π Curious how your employees would respond if targeted in real-world attack simulations? Book a free demo
#CISO #Honeypots #CyberSecurity #ThreatIntelligence #AUMINT