In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
Internal Chaos vs. Hackers – Why Your Organization Is More Vulnerable Than You Think
🚨 Internal Chaos Outweighs Hackers in Cyber Incidents
A recent report reveals that internal misalignment during cyber incidents causes more disruption than the attackers themselves. Key findings include:
73% of organizations experience tension between CISOs and CEOs during cyber incidents.
54% report shifts in decision ownership mid-incident, creating uncertainty.
86% suffer delays due to communication breakdowns between teams.
57% encounter major incidents they hadn’t rehearsed.
These insights highlight the critical need for clear communication, defined roles, and coordinated efforts across all departments during a cyber crisis. AUMINT.io offers solutions to address these internal vulnerabilities and enhance organizational readiness.
To learn more about how AUMINT.io can help your organization strengthen its internal processes and improve cybersecurity resilience, schedule an introductory call here
.
#CyberSecurity #IncidentResponse #InternalChaos #AUMINT #CyberResilience #CISO #CEO #CommunicationBreakdown #LeadershipConflicts
Stop Deleting Spam – Turn Your Inbox Into a Cyber Defense Tool
📧 Stop Deleting Spam – Learn From Every Message
Every spam you delete silently teaches attackers.
Marking spam trains filters and helps your team detect advanced threats.
Modern spam hides as bank alerts, invoices, and internal notifications – often overlooked.
Clicking “Unsubscribe” confirms your account is active – a signal attackers track.
AUMINT.io’s Trident simulates complex spam and phishing, trains employees, and turns your inbox into a defense system.
Turn every suspicious email into intelligence. Book your session
now.
#CISO #CTO #CyberSecurity #Phishing #EmailSecurity #SocialEngineering
Why Behaviour Will Decide Your Next Cybersecurity Breach
🎯 Behaviour, Not Tools, Will Trigger Your Next Breach
🧠 Nearly 60 percent of cyber breaches stem from human error, manipulation, or misuse. Technology alone won’t prevent the next incident.
🎭 AI is fueling social engineering – convincing deepfake videos or flawless emails fool even trained employees.
💥 What if your defence could catch risks before they escalate? Human risk analytics does just that – spotting unusual patterns, injecting friction, and nudging users toward safer action.
👥 At AUMINT.io, we don’t just teach – we simulate real-world attacks in flow, track real behaviours, and help teams build instincts to spot deception before damage is done.
👉 Don’t guess how your people will respond under pressure. Book your session now
and build a behaviour-based defence.
#CISO #CIO #CyberSecurity #HumanRisk #SocialEngineering #SecurityOps