Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.Β
How does water holing attack work?
- Β The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
Mid-Market Firms Under Siege: The Alarming Surge in Social Engineering Attacks
π Mid-Market Firms: Vendor Risks You Canβt Ignore
Nearly 90% of mid-market firms have faced cyberattacks originating from vendor networks in the past year. Hackers are increasingly exploiting third-party vulnerabilities to access internal systems.
Common tactics include phishing, malware injections, and business email compromise, often leveraging trusted vendor credentials. Attackers exploit these relationships to bypass traditional security measures and infiltrate operations.
The consequences are severe β data breaches, ransomware, and financial fraud have disrupted operations and caused significant losses. Many mid-market firms rely on legacy defenses that are no longer sufficient against modern attack vectors.
Proactive vendor risk management and social engineering simulations significantly reduce breach likelihood. Firms that invest in these strategies are better equipped to detect weaknesses before attackers do.
AUMINT.io provides tailored monitoring and actionable insights, helping mid-market firms strengthen defenses across all vendor relationships.
Secure your firm before an attack happens. Learn more: https://calendly.com/aumint/aumint-intro
#Cybersecurity #MidMarketFirms #SocialEngineering #FraudPrevention #VendorRisk #AUMINT