Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.Β
How does water holing attack work?
- Β The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
π CISOs: Best Free Tools for Vulnerability Scanning π
Vulnerability scanning is essential to uncover weaknesses before attackers do. You donβt need expensive software to get started β there are robust free tools that every CISO should know.
Hereβs a curated list of top free vulnerability scanning tools:
1οΈβ£ Nmap β Network discovery and security auditing tool.
https://nmap.org/
2οΈβ£ OpenVAS (Greenbone Vulnerability Manager) β Full-featured vulnerability scanning and management platform.
https://www.greenbone.net/en/community-edition/
3οΈβ£ Nikto2 β Web server scanner that identifies outdated software and dangerous files.
https://github.com/sullo/nikto
4οΈβ£ Trivy β Vulnerability scanner for containers, Kubernetes, and cloud-native apps.
https://aquasecurity.github.io/trivy/
5οΈβ£ OWASP ZAP β Open-source web application security scanner.
https://www.zaproxy.org/
6οΈβ£ Lynis β Security auditing tool for Unix/Linux systems.
https://cisofy.com/lynis/
7οΈβ£ Clair β Static analysis for vulnerabilities in Docker and OCI images.
https://github.com/quay/clair
8οΈβ£ Wapiti β Web application vulnerability scanner for automated testing.
http://wapiti.sourceforge.net/
9οΈβ£ Vuls β Agentless vulnerability scanner for Linux and FreeBSD systems.
https://vuls.io/
π Metasploit Community Edition β Penetration testing framework with vulnerability scanning capabilities.
https://www.metasploit.com/
Integrating these tools helps CISOs identify risks, prioritize remediation, and strengthen organizational security posture.
Want to see how human risk can compound vulnerabilities? π§ AUMINT.io simulates social engineering attacks to uncover employee behaviors that attackers exploit.
π Book a free intro call: Schedule here
πΎ Save this post and start scanning smarter today!
#CISO #VulnerabilityManagement #CyberSecurity #ThreatDetection #AUMINT