Method of infection: Water-holing
OSIRIS used a Social Engineering method called “water holing” to attack German IP addresses.
How does water holing attack work?
- The victim enters the infected website.
- The website checks if the target IP is German.
- If it’s a German IP – few evasion techniques are used to bypass EDR
- And then the virus connects to its command server through the Darknet
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW,
And see where your Company is Exposed to Hackers
Recently Posted on AUMINT.io Blog
The Doppelgänger Simulation Problem: Why Social Engineering Training Must Evolve
🎭 Doppelgänger Attacks Are Redefining Social Engineering
⚡ Attackers are now cloning executives’ voices, emails, and even chat styles with AI precision.
⚡ These doppelgängers slip into workflows unnoticed, making requests employees rarely question.
⚡ The result is costly approvals, fraudulent transfers, and reputational damage that spreads fast.
Most shocking: many organizations still rely on outdated phishing tests that don’t reflect today’s reality. Employees need to experience what real manipulation feels like – not a watered-down version.
🛡️ That’s why at AUMINT.io we built Trident, a platform that simulates doppelgänger-style attacks in real time. By exposing teams to these modern tactics, organizations can build real resilience before attackers strike.
👉 Curious to see how your team would react to a convincing impersonation? Book a call today
.
#CyberSecurity #SocialEngineering #FraudPrevention #AIThreats #CISO #CIO #BoardDirectors #ITSecurity #CyberResilience