Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.
How does water holing attack work?
- The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
Silent Ransom Group’s Targeting of Law Firms: A Wake-Up Call for the Legal Industry
⚖️ Law Firms Under Siege: Silent Ransom Group’s Sophisticated Attacks
📢 The FBI has issued a warning about the Silent Ransom Group (SRG), also known as Luna Moth, targeting U.S. law firms with advanced social engineering tactics.
📧 SRG sends phishing emails disguised as subscription invoices, prompting recipients to call a number where attackers impersonate IT support.
🖥️ Victims are guided to install remote access tools like AnyDesk or Zoho Assist, granting attackers control over their systems.
🔐 Once inside, SRG exfiltrates sensitive legal data and demands ransom payments to prevent public disclosure.
🎯 Law firms are prime targets due to the confidential nature of their data, making them more susceptible to extortion.
🛡️ To defend against such threats, law firms must invest in employee training, implement strict access controls, and develop comprehensive incident response plans.
🔒 Stay ahead of emerging threats. Schedule a consultation with AUMINT.io today.
#CyberSecurity #LegalIndustry #SocialEngineering #AUMINT