Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.
How does water holing attack work?
- The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
Manufacturing’s Cybersecurity Crisis: Why Legacy Systems and Supply Chains Are the New Frontlines
🏭 Manufacturing Under Siege: Cyber Threats You Can’t Ignore
🔧 Legacy systems in manufacturing are becoming gateways for cybercriminals.
🔗 Interconnected supply chains mean a breach in one vendor can compromise multiple organizations.
💸 Unscheduled downtime is draining 11% of annual revenues from top manufacturers.
🖥️ The merging of IT and OT systems allows threats to move seamlessly across networks.
🛡️ At AUMINT.io, we provide tailored cybersecurity solutions to protect your manufacturing operations from these evolving threats.
📅 Schedule a consultation with AUMINT.io today to safeguard your organization.
#CyberSecurity #Manufacturing #SupplyChainSecurity #AUMINT