Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.Β
How does water holing attack work?
- Β The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
π° Free Breach Cost Calculators to Shock Your Board π°
Understanding the financial impact of a breach is critical for CISOs when communicating risk to executives. Luckily, there are free calculators that estimate breach costs, helping you make your case effectively.
Here are the top free breach cost calculators:
1οΈβ£ IBM Cost of a Data Breach Calculator β Estimate potential losses based on industry, size, and breach type.
π https://www.ibm.com/security/data-breach
2οΈβ£ RiskLens Free Calculator β Quantifies cyber risk in financial terms for board presentations.
π https://www.risklens.com/
3οΈβ£ Cyence Free Risk Calculator β Models the financial impact of cyber incidents on your organization.
π https://www.cynece.com/
4οΈβ£ BitSight Breach Cost Insights β Estimates breach-related financial exposure using security rating data.
π https://www.bitsight.com/
5οΈβ£ Ponemon Institute Cost of Breach Tool β Provides benchmarks for breach cost analysis by sector.
π https://www.ponemon.org/
6οΈβ£ SANS Breach Cost Templates β Free Excel templates for estimating internal and external breach costs.
π https://www.sans.org/white-papers/
7οΈβ£ AUMINT Breach Simulation Tool β Combines human risk and technical exposure to estimate potential losses.
π https://aumint.io/resources
β‘ Takeaway: These tools help CISOs translate technical vulnerabilities into financial impact, making it easier to secure budget and executive buy-in.
At AUMINT.io, we add another layer β simulating employee-targeted attacks and insider scenarios to quantify human-driven breach risk, giving your board a complete picture.
π Want to show your executives how human factors affect breach costs? Book a free demo
#BreachCost #CISO #CyberSecurity #RiskManagement #AUMINT