Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.Β
How does water holing attack work?
- Β The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
Ransomware Is Targeting Your IT and OT Systems β Are You Prepared?
β οΈ Ransomware Is Targeting Both IT and OT
Ransomware attacks are now exploiting the convergence of IT and OT networks, hitting operational systems and business IT simultaneously.
Legacy OT devices often lack modern security, creating easy entry points for attackers.
Once inside, ransomware can propagate across networks, locking critical systems and threatening operations.
Human error and social engineering remain top vulnerabilities, with attackers leveraging AI-enhanced tactics to deceive employees.
Many organizations are underprepared β insufficient monitoring, outdated protocols, and lack of employee awareness leave critical systems exposed.
AUMINT.io provides advanced simulations, training, and real-time dashboards to help teams detect, respond, and prevent ransomware attacks across IT and OT systems.
Protect your organization before itβs too late β Book Your AUMINT.io Intro
.
#CISO #OTSecurity #CyberSecurity #SocialEngineering #ITLeaders #IndustrialSecurity