Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.
How does water holing attack work?
- The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
91 Million Lost to a Social Engineering Bitcoin Scam – How to Protect Your Assets
🚨 $91 Million Lost to Social Engineering in Crypto
⚠️ A high-profile investor fell victim to a meticulously executed Bitcoin scam, losing $91 million overnight.
💡 Fraudsters exploit trust and human error, bypassing even the most advanced technical safeguards.
🔍 Social engineering targets communication gaps, psychological triggers, and unsuspecting staff, making human vigilance the critical defense.
🛡️ AUMINT Trident simulates real-world attacks, training teams to detect deception, verify communications, and react under pressure, reinforcing human security layers.
📅 Protect your digital assets and organization before it’s too late: https://calendly.com/aumint/aumint-intro
.
#CryptoSecurity #CISO #SocialEngineering #FraudPrevention #InvestorProtection #BlockchainSecurity #ExecutiveProtection