Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.
How does water holing attack work?
- The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
How LastPass Thwarted a Deepfake CEO Scam – And What It Means for Your Business
🚨 LastPass Foils Deepfake CEO Scam – Here’s How
In April 2024, a LastPass employee received a series of messages – including calls, texts, and a voicemail – featuring an AI-generated voice impersonating CEO Karim Toubba. The attacker used WhatsApp, an unconventional communication channel for the company, to create a sense of urgency.
Fortunately, the employee recognized the red flags:
The use of WhatsApp, not a standard business communication tool.
The forced urgency in the messages.
The unusual nature of the request.
Suspicious of the authenticity, the employee ignored the messages and reported the incident to the internal security team. As a result, the company suffered no impact from the attack.
This incident underscores the growing threat of AI-powered deepfake scams. Deepfakes use generative AI to create realistic audio and video impersonations, making it increasingly difficult to distinguish between legitimate and fraudulent communications. Such attacks are not limited to high-profile targets; they can affect businesses of all sizes.
At AUMINT.io, we specialize in helping businesses defend against evolving cyber threats, including deepfake scams. Our solutions are designed to detect and mitigate risks associated with AI-driven attacks, ensuring the security of your organization’s sensitive information.
Don’t wait until it’s too late – Schedule a consultation with AUMINT.io today to fortify your defenses against emerging cyber threats.
#CyberSecurity #Deepfake #AIThreats #BusinessProtection #AUMINT