Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.Β
How does water holing attack work?
- Β The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
π₯οΈ CISOs: 10 Free Tools to Improve Your Endpoint Security Posture π₯οΈ
Endpoints are the gateways attackers target most. Securing them effectively means using the right tools β and you donβt always need a big budget to start.
Hereβs a curated list of 10 free tools every CISO should explore to strengthen endpoint security across your environment:
1οΈβ£ Microsoft Defender for Endpoint (Free Tier) β Basic protection and detection for Windows endpoints.
https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint
2οΈβ£ OSQuery β Query your endpoints in real time with SQL-like commands for visibility and auditing.
https://osquery.io/
3οΈβ£ Lynis β Security auditing and hardening tool for Unix/Linux systems.
https://cisofy.com/lynis/
4οΈβ£ GRR Rapid Response β Remote live forensics and incident response framework.
https://github.com/google/grr
5οΈβ£ Kaspersky Virus Removal Tool β Free on-demand malware scanner and remover.
https://www.kaspersky.com/downloads/thank-you/free-virus-removal-tool
6οΈβ£ CrowdStrike Falcon Sensor (Free Trial) β Lightweight endpoint detection and response for testing.
https://www.crowdstrike.com/
7οΈβ£ Bitdefender Rescue CD β Offline bootable tool for deep malware cleanup.
https://www.bitdefender.com/support/how-to-create-a-bitdefender-rescue-cd-627.html
8οΈβ£ Wazuh Agent β Endpoint monitoring and log collection integrated with SIEM.
https://documentation.wazuh.com/current/installation-guide/installing-wazuh-agent/index.html
9οΈβ£ Cisco AMP for Endpoints (Trial) β Malware protection combined with analytics.
https://www.cisco.com/c/en/us/products/security/amp-for-endpoints/index.html
π Traccar β Open-source GPS tracking to monitor mobile endpoint locations and usage.
https://www.traccar.org/
These tools provide a strong foundation to identify, analyze, and respond to threats without upfront licensing costs.
Want to identify hidden human risks that can lead to endpoint breaches? AUMINT.io runs live social engineering attack simulations so you can measure and reduce human vulnerabilities.
π Ready to strengthen your endpoint security? Book a free intro call
π‘οΈ Save this post and empower your security team with these no-cost tools today!
#CISO #EndpointSecurity #EDR #CyberSecurity #ThreatDetection #AUMINT