Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.
How does water holing attack work?
- The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
Help Desk Impersonation Is the New Favorite Move in Social Engineering
📞 Fake IT Help Desks Are Targeting Your Team Now
🚨 Cybercriminals are impersonating internal support teams – and it’s catching companies off guard.
🧠 The voice sounds legit. The details are right. The urgency feels real. But that “IT agent” is actually harvesting your login info.
🎯 These impersonators spoof internal caller IDs and even mimic your own help desk templates to manipulate trust.
🕵️ Employees assume anything from the help desk is safe – which is exactly why it works.
🛑 Most security training completely overlooks internal impersonation risks.
📌 AUMINT.io fixes that.
We simulate real help desk impersonation attacks across phone and email to build real-life reflexes in your team.
✅ Give your staff the instincts to say “no” even when it sounds like help.
Book Your Simulation
#SocialEngineering #CyberSecurity #HelpDeskScams #SecurityAwareness #CISO #SMBSecurity #AUMINT #ImpersonationFraud #ITLeadership #PhishingDefense