Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.Β
How does water holing attack work?
- Β The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
Why Social Engineering Has Become ITβs Newest and Most Dangerous Headache
π Social Engineering: ITβs Most Dangerous New Risk
β‘ The biggest threat facing IT leaders isnβt malware β itβs manipulation.
β‘ Attackers no longer rely on code β they exploit human trust.
β‘ The shocking part? Even the most advanced security setups can be bypassed with one convincing email from a βCEOβ asking for urgent approval.
β‘ Remote work has expanded the attack surface. Employees across finance, HR, and IT are hit daily with fake requests that look alarmingly real.
β‘ Traditional once-a-year awareness training fails here. It fades from memory long before the next attack lands.
β‘ What works instead is continuous simulation that mimics real-life pressure and deception β preparing employees to pause, verify, and protect.
β‘ Thatβs exactly what AUMINT.ioβs Trident delivers: recurring, personalized simulations that transform weak points into resilient defenses.
β‘ Ready to turn employees into your strongest shield? Book your intro session today
.
#CISO #CFO #CEO #CyberSecurity #RiskManagement #ITLeaders #FraudPrevention