Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.Β
How does water holing attack work?
- Β The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
AI-Powered Cyber Attacks Are Outpacing Your Defenses β Is Your Organization Ready?
π¨ AI Cyber Threats Are Already Inside Your Organization
Most organizations are unprepared for AI-driven cyberattacks.
86% of executives reported AI-related security incidents last year, yet only 4% of organizations can effectively defend against them.
Nearly half of employees use unsanctioned AI tools, and 60% of organizations cannot detect Shadow AI activities.
From identity management to endpoint reliability and cloud hardening, most companies are still in the early stages of implementing necessary protections.
These gaps leave your organization exposed to highly sophisticated AI-based attacks.
At AUMINT.io, we provide tailored simulations, employee training, and dashboards to strengthen defenses across all critical areas.
Ensure your team is ready β Book Your AUMINT.io Intro
today and safeguard your organization.
#CISO #CyberSecurity #AI #SocialEngineering #ITLeaders #TechExecs