Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.
How does water holing attack work?
- The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
The Silent Threat: How Executive Digital Footprints Are Exposing Enterprises
🔍 Executive Digital Footprints: The Overlooked Cybersecurity Risk
📱 Executives’ online activities, from social media posts to virtual meetings, contribute to digital footprints that cybercriminals are exploiting.
🎭 Threat actors use this information to craft convincing phishing campaigns and deepfake impersonations, targeting both personal and professional accounts.
🔐 The convergence of personal and corporate digital spaces necessitates a comprehensive cybersecurity strategy that addresses these unique vulnerabilities.
🛡️ At AUMINT.io, we specialize in protecting executive digital profiles, ensuring that personal online activities do not become entry points for cyber threats.
📅 Schedule a consultation with AUMINT.io today to safeguard your organization’s leadership against sophisticated cyber attacks.
#CyberSecurity #ExecutiveProtection #DigitalFootprint #AUMINT