Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.
How does water holing attack work?
- The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
The Silent Threat Hiding in Plain Sight – How PDFs Became the Ultimate Cyber Weapon
📄 PDF Files Are Now Cybercriminals’ Favorite Weapon
📩 22% of cyberattacks are hiding inside PDFs. Not ransomware files. Not shady links. Trusted PDFs.
🔍 These attacks often bypass antivirus filters, using embedded scripts and code to quietly steal data or take control of systems.
📊 New data shows 68% of cyberattacks begin via email – and users rarely hesitate to open a PDF from a known source.
🧠 It’s social engineering meets stealth malware – and your team may be clicking without ever realizing they’re under attack.
🛡️ AUMINT.io uses AI-driven PDF scanning, behavioral threat analysis, and real-time email monitoring to detect and stop these attacks before they hit your inbox.
💡 Don’t wait for the breach to happen. Book your security session today and let us help you shut the door on silent threats.
#Cybersecurity #EmailSecurity #PhishingPrevention #PDFThreats #ThreatIntelligence #AUMINT #Infosec #CISO #ZeroTrust #EndpointSecurity