Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.Β
How does water holing attack work?
- Β The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
Cybercriminal Alliances in 2025 β Why Collaboration is Their Greatest Weapon
βοΈ Cybercriminals Are Teaming Up β Are Your Defenses Ready?
π¨ In 2025, attackers no longer work alone. They operate in highly organized alliances that share tools, data, and expertise to multiply their impact.
π€― The most dangerous evolution? Technical hackers and social engineering experts joining forces β using AI phishing to open the door while trained fraudsters exploit human trust inside.
π Many companies still think of cyberattacks as isolated incidents. In reality, the threat is now an ecosystem, where multiple criminal groups converge on vulnerabilities simultaneously.
π’ Mid-market firms and regulated industries face the highest risk. Unlike big enterprises, they rarely have layered defenses and often underestimate how quickly attacks escalate when criminals collaborate.
π The truth is simple β criminals embraced collaboration faster than defenders. If businesses remain reactive, they will always be one step behind.
π At AUMINT.io we help organizations fight collaboration with collaboration. Our simulations expose real-world attack tactics and prepare employees to recognize manipulative techniques before they succeed.
π Curious how your teams would perform against a coordinated attack? Book your intro session
and see what vulnerabilities could be hiding in plain sight.
#CISO #CIO #CEO #FraudPrevention #CyberSecurity #RiskManagement