Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.Β
How does water holing attack work?
- Β The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
π CISOs: Must-Have Free Cybersecurity Tools in 2025 π
The cybersecurity landscape keeps evolving, and so should your toolkit. But high-quality tools donβt have to drain your budget.
Hereβs a handpicked list of must-have free tools every CISO should explore in 2025 to protect, monitor, and respond effectively:
1οΈβ£ Wazuh β Open-source SIEM, log analysis, and endpoint monitoring.
https://wazuh.com/
2οΈβ£ OSQuery β SQL-like queries to monitor endpoint security in real time.
https://osquery.io/
3οΈβ£ Nmap β Network discovery and vulnerability scanning made simple.
https://nmap.org/
4οΈβ£ Nikto2 β Web server scanning for dangerous files and outdated software.
https://github.com/sullo/nikto
5οΈβ£ TheHive Project β Collaborative incident response platform for fast investigations.
https://thehive-project.org/
6οΈβ£ MISP (Malware Information Sharing Platform) β Collect, store, and share threat intelligence.
https://www.misp-project.org/
7οΈβ£ GRR Rapid Response β Remote live forensics framework for endpoints.
https://github.com/google/grr
8οΈβ£ Security Onion β Linux distro packed with monitoring, detection, and threat hunting tools.
https://securityonionsolutions.com/
9οΈβ£ Trivy β Free container vulnerability scanner for Docker and Kubernetes.
https://aquasecurity.github.io/trivy/
π MITRE ATT&CK Navigator β Visualize attacker tactics and techniques to improve defense strategy.
https://attack.mitre.org/
These tools provide a strong foundation for building a robust cybersecurity posture while staying cost-efficient.
Want to uncover human risks that tech canβt see? AUMINT.io runs real-world social engineering simulations to reveal hidden vulnerabilities in your workforce.
π Explore with a free intro call: Schedule here
πΎ Save this post and start upgrading your 2025 cybersecurity toolkit today!
#CISO #CyberSecurityTools #OpenSourceSecurity #ThreatDetection #AUMINT