Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.
How does water holing attack work?
- The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
Humans Remain the Weakest Link – Why Social Engineering Dominates Cyber Threats in 2025
🚨 Humans Are Still the #1 Cybersecurity Risk
📊 Over 80% of organizations now rank social engineering as their greatest threat.
💡 Here’s the twist: it is not just about phishing emails anymore. Attackers are using deepfakes, urgent voice calls, and even video manipulation to outsmart people in ways firewalls cannot stop.
😱 The shock is not in the tools they use – it is in how easily human behavior is exploited. One click, one reply, one rushed decision can unlock the doors no hacker could force open.
🔍 The data tells us most training programs are outdated. Annual awareness sessions fail because attackers test every single day. The result – mid-market firms are losing millions while attackers refine their playbook.
🔥 What works instead? Recurring simulations that mirror real-world social engineering attacks, combined with dashboards that show CISOs and boards exactly where their human vulnerabilities are hiding.
👥 In 2025, the true security perimeter is people – and it is under constant siege.
📅 Want to see how to transform employees into a resilient defense system? Book your session here: https://calendly.com/aumint/aumint-intro
.
#CISO #CyberSecurity #FraudPrevention #BoardDirectors #RiskManagement #HumanFactor #AwarenessTraining #CyberResilience