In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
Weaponized Trust – How Hackers Are Turning Certificates Against You
🔐 Hackers Are Signing Malware With Trusted Certificates
⚠️ They’re no longer brute-forcing their way in – they’re using stolen private keys and signing certificates to slip past your defenses.
📦 Signed malware now looks safe to: – Antivirus – EDR systems – Users
💥 This isn’t just technical – it’s psychological. Users are trained to trust “Verified” files. And that’s exactly what attackers exploit.
🧠 AUMINT.io’s Trident platform breaks the false trust cycle: – Simulates realistic attack behaviors – Conditions users to question what looks legit – Provides CISOs with real-time risk insights
🎯 When malware hides behind a trusted certificate, your last line of defense is human instinct. Train it with Trident.
💬 Book your intro call – before trust gets weaponized against you.
#CyberResilience #StolenCerts #HumanFirewall #CISO #SecurityAwarenessTraining #TridentByAUMINT #SocialEngineeringDefense #SignedMalware
The Cybersecurity Wake-Up Call No One Wants to Hear
🚨 Human Error Still Tops Cyber Risk Charts – Here’s Why
📉 Lack of security awareness remains the #1 threat to organizations
👀 It’s not outdated firewalls – it’s untrained teams
💥 Social engineering is evolving faster than your current training programs
🧠 Annual workshops don’t stand a chance against daily AI-fueled phishing and impersonation attacks
🔄 That’s where AUMINT.io’s Trident flips the script:
🎯 Adaptive, ongoing training simulations tailored to real-world social engineering threats
📊 Live dashboards for CISOs to track awareness risk in real time
✅ Engaging, relevant, and behavior-focused – not boring checkboxes
🛡️ Your tech stack is only as strong as your human layer.
💬 Book your security awareness strategy session now
#HumanRisk #SecurityAwareness #TridentByAUMINT #CISO #CyberResilience #SocialEngineering #PhishingDefense
Marks & Spencer Cyberattack: A Wake-Up Call for Retail Cybersecurity
🛍️ Marks & Spencer Cyberattack: A Wake-Up Call for Retailers
🔐 The recent cyber incident at M&S disrupted online orders and in-store services, highlighting vulnerabilities in retail cybersecurity.
💳 Customers faced issues with contactless payments and gift card transactions, emphasizing the need for robust digital defenses.
📉 The financial impact is significant, with potential losses from suspended online sales and diminished customer trust.
🛡️ Retailers must prioritize comprehensive cybersecurity strategies that include technological safeguards and employee training.
💡 AUMINT.io’s Trident platform offers:
Advanced threat detection to identify and mitigate risks.
Continuous employee training to recognize and respond to threats.
Incident response planning to ensure business continuity.
📈 Strengthen your organization’s cybersecurity posture.
👉 Schedule your free strategy session with AUMINT.io now and protect your business from cyber threats.
#CyberSecurity #RetailSecurity #M&S #AUMINT #CISO