In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
Healthcare Cyberattacks Are Putting Patient Care at Risk – Here’s What You Need to Know
🚨 Healthcare Cyberattacks Impacting Patient Care
Nearly 20% of healthcare leaders confirm cyberattacks have disrupted critical patient services.
⚠️ These attacks can delay treatments, cause misdiagnoses, and interrupt emergency responses.
🔐 Traditional security isn’t enough – healthcare needs proactive, adaptive defenses against evolving threats.
🩺 AUMINT.io delivers continuous social engineering simulations and real-time analytics tailored for healthcare.
⏳ Protect your patients and your reputation before the next attack.
Book your free AUMINT.io consultation now
#HealthcareSecurity #CyberSecurity #PatientSafety #SocialEngineering #AUMINT #CISO #HealthcareIT #ThreatIntelligence
💣 You’re Not Being Targeted – You’re Being Indexed
Attackers don’t “target” most companies.
They crawl, scan, and index public exposures like a search engine.
If something you forgot is exposed – they’ll find it.
AUMINT’s €1,500 Attack Surface Report uncovers:
• Public-facing assets tied to your domain
• Exposed employee data or credentials
• Forgotten environments still live
This is what you don’t see in your dashboards.
🧭 If Google can find it, so can a threat actor.
🔍 Book a scan and see what’s exposed: https://calendly.com/aumint/aumint-intro
#CyberSecurity #AttackSurface #DigitalFootprint #InfoSec #CISO #RiskExposure #AUMINT
AI Is Supercharging Phishing, Smishing, and Vishing Attacks – What You Must Know Now
⚠️ AI Is Powering Next-Gen Phishing, Smishing, and Vishing
🚨 AI automates ultra-realistic phishing emails that mimic your company’s style and timing.
📱 Smishing and vishing now use AI-crafted scripts and deepfake voices that fool even the wary.
⚠️ Static training and controls won’t keep up with AI-driven attackers learning from every attempt.
🔍 AUMINT.io combines AI analytics with real-time simulations to outsmart evolving social engineering attacks.
⏳ Don’t wait for the breach – future-proof your defenses today.
Secure your AI-powered defense now
#CyberSecurity #Phishing #AIThreats #SocialEngineering #AUMINT #ThreatIntelligence #CISO #SOC