Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.
How does water holing attack work?
- The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
Why EMEA Enterprises Are Prime Targets for Vendor Email Compromise
📧 Why EMEA Enterprises Face Higher VEC Risks
Vendor Email Compromise (VEC) is skyrocketing in EMEA, with 72% of employees at large enterprises engaging with suspicious vendor emails — that’s nearly double the engagement rate of Business Email Compromise (BEC) attacks.
Even more alarming? EMEA organizations report just 0.27% of VEC incidents, the lowest rate worldwide, leaving many attacks undetected and unresolved.
The telecom sector and junior sales staff are especially vulnerable, with engagement rates hitting 71% and 86% respectively.
This data reveals a troubling pattern: EMEA enterprises tend to trust vendor emails too easily, creating an entry point for costly cyber fraud.
Preventing VEC demands more than technology—it requires proactive employee training, awareness, and advanced AI-driven detection.
At AUMINT.io, we tailor cybersecurity defenses to EMEA’s unique challenges to stop VEC before it causes damage.
Take control of your security today.
Book a Consultation with AUMINT.io
#Cybersecurity #VEC #EMEA #EmailSecurity #ThreatIntelligence #CISO #SecurityAwareness