Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.Β
How does water holing attack work?
- Β The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
π₯οΈ CISOs: 10 Free Tools to Improve Your Endpoint Security Posture π₯οΈ
Your endpoints are your front lines β but securing them doesn’t have to break your budget.
Whether you’re dealing with BYOD chaos or hybrid work exposure, the right free tools can harden your defenses fast.
Hereβs a curated list of 10 powerful, no-cost tools every CISO should consider for better endpoint security:
1οΈβ£ Microsoft Defender for Endpoint (Free Tier) β Baseline protection for Windows environments with solid detection capabilities.
https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint
2οΈβ£ OSQuery β Monitor endpoint state in real time using SQL-like queries across platforms.
https://osquery.io/
3οΈβ£ CrowdStrike Falcon Sensor (Free Trial) β Lightweight and fast EDR tool to test in small environments.
https://www.crowdstrike.com/
4οΈβ£ Kaspersky Virus Removal Tool β Free emergency scanner for deep threat cleaning.
https://www.kaspersky.com/downloads/thank-you/free-virus-removal-tool
5οΈβ£ Lynis β Audit and harden Linux-based endpoints with detailed security checks.
https://cisofy.com/lynis/
6οΈβ£ GRR Rapid Response β Incident response framework focused on remote live forensics.
https://github.com/google/grr
7οΈβ£ Cisco AMP for Endpoints (Trial) β Combines malware protection and analytics for deep insights.
https://www.cisco.com/c/en/us/products/security/amp-for-endpoints/index.html
8οΈβ£ Bitdefender Rescue CD β Offline malware removal for deeply infected systems.
https://www.bitdefender.com/support/how-to-create-a-bitdefender-rescue-cd-627.html
9οΈβ£ Traccar β Open-source GPS tracking software for mobile endpoint visibility and device control.
https://www.traccar.org/
π Wazuh Agent β Collects logs and monitors endpoint integrity within a broader SIEM ecosystem.
https://documentation.wazuh.com/current/installation-guide/installing-wazuh-agent/index.html
These tools are especially useful for organizations with lean security budgets that still want maximum visibility, control, and response capability across diverse endpoints.
π§ Want to surface human error risks before they lead to endpoint compromise? AUMINT.io lets CISOs simulate real-world social engineering attacks across teams: Schedule here
π‘οΈ Save this post and level up your endpoint defenses β no license fees required!
#CISO #EndpointSecurity #EDR #CyberSecurity #RemoteWorkSecurity #AUMINT