In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.

Nefilim Ransomware Attack Used “Ghost” Credentials.

According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services. 

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

Deepfake Attacks Are Reshaping Cybersecurity – Why Leaders Must Act Now

🎭 Deepfakes Are Already Fooling Your Colleagues

⚡ Two-thirds of organizations have already been hit by deepfake attacks.

📈 These aren’t cheap pranks – they are sophisticated schemes where cybercriminals impersonate executives with AI-generated voices or videos to authorize fraudulent transactions.

💡 Imagine receiving a call that sounds exactly like your CEO ordering an urgent wire transfer. Would your team spot the fraud in time?

🔍 Deepfakes are blurring the line between trust and deception, making traditional awareness programs dangerously insufficient. Attackers are no longer relying on phishing emails – they are using faces and voices your people know to bypass defenses.

🚨 The real question isn’t if your company will face this, but whether your employees are prepared when it happens.

✅ At AUMINT.io, our Trident platform runs recurring simulations, mimicking AI-powered social engineering to reveal vulnerabilities and strengthen response.

📌 Want to see how your team would perform against a deepfake attack? Book your AUMINT intro call
today.

#CISO #CIO #CEO #FraudPrevention #CyberSecurity #RiskManagement #BoardDirectors

read more

Hackers Exploit ChatGPT and Office Tools to Infiltrate Corporations

🚨 Hackers Hijack AI Tools for Corporate Breaches

🔍 Cybercriminals are embedding malware inside ChatGPT plugins and Office automation tools – tools your employees might already be downloading.

⚡ The trick works because these tools look helpful, not harmful. A simple “AI assistant” can secretly steal credentials or create backdoors into enterprise systems.

📊 The biggest danger is not the code itself but the trust employees place in AI-branded productivity. Social engineering, wrapped in innovation, is a powerful disguise.

🛡️ Organizations must act now: simulate these attacks, train staff to question downloads, and validate all third-party AI tools.

🚀 AUMINT.io helps companies prepare with simulations, adaptive training, and executive dashboards.

👉 Don’t wait until a plugin becomes your breach. Book Your AUMINT.io Intro
.

#CISO #CTO #CIO #CyberSecurity #AIThreats #FraudPrevention #HumanFirewall #EnterpriseSecurity

read more

AI Image Scaling Exposes Hidden Security Risks in Prompt Injection

🚨 AI Image Scaling Under Threat

Prompt injection attacks are now targeting AI image scaling tools, tricking models into performing unintended tasks.

Even seemingly safe AI systems can be manipulated through subtle input changes, exposing data or altering outputs.

Organizations using AI for creative or operational processes must anticipate these vulnerabilities.

AUMINT.io strengthens both human and AI defenses with simulations, training, and dashboards.

Prepare your team to recognize and respond to AI-targeted threats: Book Your AUMINT.io Intro
.

#CISO #CTO #CyberSecurity #AIThreats #SocialEngineering #ITSecurity #HumanFirewall #EnterpriseSecurity

read more