Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.
How does water holing attack work?
- The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
Why Social Engineering Has Become IT’s Newest and Most Dangerous Headache
🔒 Social Engineering: IT’s Most Dangerous New Risk
⚡ The biggest threat facing IT leaders isn’t malware – it’s manipulation.
⚡ Attackers no longer rely on code – they exploit human trust.
⚡ The shocking part? Even the most advanced security setups can be bypassed with one convincing email from a “CEO” asking for urgent approval.
⚡ Remote work has expanded the attack surface. Employees across finance, HR, and IT are hit daily with fake requests that look alarmingly real.
⚡ Traditional once-a-year awareness training fails here. It fades from memory long before the next attack lands.
⚡ What works instead is continuous simulation that mimics real-life pressure and deception – preparing employees to pause, verify, and protect.
⚡ That’s exactly what AUMINT.io’s Trident delivers: recurring, personalized simulations that transform weak points into resilient defenses.
⚡ Ready to turn employees into your strongest shield? Book your intro session today
.
#CISO #CFO #CEO #CyberSecurity #RiskManagement #ITLeaders #FraudPrevention