Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.Β
How does water holing attack work?
- Β The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
Shadow IT and Zero Trust β Navigating the Next Wave of Chaos
π₯ Shadow IT Is Breaking Zero Trust Faster Than You Think
π¨ In 2025, Shadow IT isnβt a side risk β itβs the chaos that undermines even the strongest cybersecurity frameworks.
π Zero Trust sounds solid on paper β but if employees adopt tools outside approved channels, βnever trust, always verifyβ loses its foundation.
π₯ The surprising truth? Shadow IT is less about technology and more about human behavior. Employees turn to unsanctioned apps when official tools feel too slow or restrictive.
π Attackers know this and exploit it β using fake portals, unauthorized logins, and social engineering tactics to steal access credentials hidden in plain sight.
π This is where proactive resilience matters. By simulating Shadow IT-driven attack scenarios and revealing where risks are highest, CISOs can finally close blind spots before criminals strike.
π At AUMINT.io, our Trident platform was built for this reality β turning Shadow IT chaos into actionable visibility and strengthening people as the true frontline.
π Ready to see how to take back control? Book your introduction call today
.
#CISO #CTO #CEO #CyberSecurity #FraudPrevention #ShadowIT #ZeroTrust