Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.Β
How does water holing attack work?
- Β The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
β‘ Free Vulnerability Prioritization Tools That Save CISOs Time β‘
Thousands of vulnerabilities hit every year β but not all deserve your teamβs immediate attention. The real challenge for CISOs is knowing which ones matter most, right now. Here are free tools that help cut through the noise and focus on whatβs critical:
1οΈβ£ EPSS (Exploit Prediction Scoring System) β Prioritizes based on likelihood of exploitation in the wild.
π https://www.first.org/epss/
2οΈβ£ CISA KEV Catalog β Free authoritative list of vulnerabilities actively exploited by adversaries.
π https://www.cisa.gov/known-exploited-vulnerabilities-catalog
3οΈβ£ Vulners.com β Aggregates threat intelligence, exploits, and vulnerability data with prioritization insights.
π https://vulners.com
4οΈβ£ Qualys TruRisk Free Tier β Helps identify and prioritize vulnerabilities by risk scoring.
π https://www.qualys.com/trurisk/
5οΈβ£ OpenVAS (via Greenbone) β Vulnerability scanner with reporting that supports prioritization workflows.
π https://www.greenbone.net
6οΈβ£ Kenna EPSS Explorer (Free) β Combines CVEs with EPSS data for prioritization dashboards.
π https://risk.io/labs
7οΈβ£ VulnCheck Free Portal β Provides exploit intelligence to identify which CVEs are weaponized.
π https://vulncheck.com
π‘ Takeaway: Patch everything is not a strategy. These free tools let CISOs patch smart, focusing resources on the vulnerabilities most likely to be used in attacks.
At AUMINT.io, we help CISOs go further β by simulating how attackers actually exploit overlooked human and technical gaps, then providing data-driven insights to prioritize awareness and defenses.
π Curious how your org would rank if attackers targeted your employees first? Book a free demo
#VulnerabilityManagement #CISO #CyberSecurity #ThreatPrioritization #AUMINT