Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.Β
How does water holing attack work?
- Β The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
Your Biggest Cybersecurity Risk Isnβt Hackers β Itβs Human Distraction
β‘ Employeesβ Distraction: The Hidden Breach Youβre Not Watching
π A single distracted click can bypass millions in cybersecurity investment.
π Todayβs attackers no longer rely on technical exploits β they wait for humans to multitask and slip up.
π The biggest surprise? It isnβt lack of training β itβs the fading effect of once-a-year awareness programs that leave employees unprepared when real distractions hit.
π Attackers engineer their timing: emails during busy mornings, texts before deadlines, calls when focus is low. Every moment of reduced attention is a window to exploit.
π This means the frontline of defense is no longer technology β itβs human focus under pressure.
π Companies that only train once and hope for the best are leaving the door wide open. What works is continuous, realistic simulation that mirrors everyday distractions.
π At AUMINT.io, our Trident platform builds employee resilience through adaptive simulations and feedback loops that turn distracted moments into learning opportunities.
π If your team is ready to close the distraction gap, itβs time to act. Book your intro session today
.
#CISO #CyberSecurity #RiskManagement #HealthcareSecurity #CFO #CEO #CTO #CyberAwareness