Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.
How does water holing attack work?
- The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
DocuSign Deception: How Fake Notifications Are Exploiting Your Trust
📩 Fake DocuSign Emails Are Hijacking Your Team’s Trust
🧠 Imagine receiving a contract signing request that looks 100% real – but isn’t. Welcome to the new wave of phishing scams where DocuSign is the bait.
💼 Cybercriminals are cloning notifications down to the pixel. Legit logos. Real sender names. Even spoofed URLs.
⚠️ The twist? These attacks often hit when teams are actually signing contracts, making it even harder to question them.
🔐 The cost? Stolen credentials, breached vendor data, and compromised financial files.
🛡️ It’s no longer about tech vulnerabilities. It’s about human instinct. And that’s exactly what AUMINT Trident is built to sharpen.
📉 One fake DocuSign email = one employee mistake = total breach.
📞 Don’t gamble on human intuition. Book your free AUMINT simulation to test how your team reacts before real attackers do.
#CyberSecurity #Phishing #DocuSign #EmailSecurity #SocialEngineering #AwarenessTraining #CISO #CIO #CFO #LegalOps #HumanFirewall #AUMINT