Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.
How does water holing attack work?
- The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
DORA: Elevating Cyber Resilience Standards in Financial Services
🔐 DORA: Setting the Standard for Cyber Resilience in Financial Services
The Digital Operational Resilience Act (DORA) mandates that financial institutions not only implement technical defenses but also cultivate a culture of readiness and transparency.
Key requirements include:
Developing comprehensive strategies for identifying, reporting, and mitigating ICT-related incidents.
Establishing and regularly testing detailed response plans.
Conducting ICT risk management audits to identify all types, locations, and classifications of data.
Continuous monitoring for infrastructure anomalies.
Maintaining secure, immutable backups.
At AUMINT.io, we specialize in providing tailored cybersecurity solutions to help financial institutions achieve DORA compliance. Our services encompass advanced threat detection, employee training, and incident response planning.
Ensure your organization’s resilience against cyber threats. Schedule a consultation with our experts today.
Book a Consultation with AUMINT.io
#CyberSecurity #DORA #FinancialServices #AUMINT