Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.
How does water holing attack work?
- The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
Fremantle Executive Falls Victim to €937,670 CEO Fraud – A Wake-Up Call for Global Enterprises
🚨 CEO Fraud Strikes Fremantle – €937,670 Lost
A top executive at Fremantle fell victim to a sophisticated CEO fraud scheme, losing €937,670. The attacker impersonated the executive using cloned VoIP technology, instructing an employee to transfer funds to an Asian bank account.
The money was then dispersed to multiple international accounts, complicating recovery efforts. Upon realizing the deception, the executive alerted other company leaders and contacted the Italian police, who are now investigating the matter.
This incident highlights the growing threat of CEO fraud, a form of social engineering where attackers exploit human trust to manipulate employees into transferring large sums of money. Such attacks can have devastating financial and reputational consequences for organizations.
At AUMINT.io, we specialize in providing advanced solutions to detect and prevent social engineering attacks, including CEO fraud – Our services are designed to enhance employee awareness, implement robust verification processes, and safeguard your organization against emerging cyber threats.
Don’t wait until it’s too late – Schedule a consultation with AUMINT.io today to fortify your defenses against CEO fraud and other social engineering attacks.
#CyberSecurity #CEOFraud #SocialEngineering #BusinessProtection #AUMINT