In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
AI-Powered Malware Is Redefining Cyber Threats
⚠️ AI Malware Is Outpacing Traditional Defenses
Vibe Coding malware autonomously generates self-modifying code to bypass detection.
This new AI-powered threat adapts in real time, rendering traditional antivirus and static defenses nearly obsolete.
Employees remain the most critical vulnerability – phishing, compromised endpoints, and human error are the easiest gateways for attackers.
AUMINT.io helps organizations strengthen human defenses with advanced simulations, personalized training, and real-time dashboards revealing hidden risk areas.
AI malware is evolving – human readiness is your strongest defense: Book Your AUMINT.io Intro
.
#CISO #CTO #CyberSecurity #EnterpriseSecurity #SocialEngineering #ITLeadership
Google Captive Portal Attack in China Exposes Critical Risks
🚨 Google Captive Portal Attack Hits China
Attackers exploited Wi-Fi login portals to steal credentials, compromising millions of users.
Public networks, including airports and hotels, can be deceptively dangerous.
Social engineering and human trust remain the weakest link in cyber security.
AUMINT.io strengthens the human layer with realistic attack simulations, tailored training, and dashboards.
Empower your team to recognize and prevent credential theft: Book Your AUMINT.io Intro
.
#CISO #CTO #CyberSecurity #SocialEngineering #ITSecurity #HumanFirewall #EnterpriseSecurity
When a Cyberattack Hits, Hierarchy Determines Your Company’s Fate
⚠️ Cyberattacks Exploit Organizational Hierarchy
Companies with lower-tier employees on critical response paths face greater disruption during attacks.
Decision bottlenecks and unclear responsibilities give attackers the upper hand, prolonging recovery.
Middle and lower-level teams are often the first line of defense, yet most exposed to social engineering and phishing.
Without proper training, human error allows malware and ransomware to spread unchecked across the organization.
AUMINT.io empowers all levels of staff with social engineering simulations, awareness programs, and executive dashboards to improve response times and reduce exposure.
Hierarchy should not dictate your company’s cyber fate – Book Your AUMINT.io Intro
.
#CISO #CyberSecurity #ITLeadership #SocialEngineering #EnterpriseSecurity #RiskManagement