Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.
How does water holing attack work?
- The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
Scattered Spider: The Silent Threat Exploiting IT Support Teams
🕸️ Scattered Spider’s Sneaky Attack on IT Support Teams
The most dangerous cyberattacks don’t always come from code – they come from exploiting human trust.
Scattered Spider, a cybercriminal group from the US and UK, has mastered this by targeting IT support teams with sophisticated voice phishing (vishing) and impersonation.
By pretending to be legitimate employees, they trick IT teams into resetting passwords or bypassing multi-factor authentication (MFA). This approach slips past even strong technical defenses.
What’s more alarming? They partner with ransomware-as-a-service groups like DragonForce to launch full-scale attacks after gaining entry.
This shows why strengthening human defenses is now as crucial as firewalls and antivirus software.
Want to learn how to protect your IT teams and your business from such stealthy threats?
At AUMINT.io, we specialize in tailored cybersecurity solutions that combine real-time threat intelligence with behavioral analytics to detect and block these human-centric attacks.
Don’t wait for a breach – take control now.
Book a Consultation with AUMINT.io
#Cybersecurity #SocialEngineering #ITSupport #FraudPrevention #SecurityAwareness #CISO #SecurityOps #ThreatIntelligence