In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.

Nefilim Ransomware Attack Used “Ghost” Credentials.

According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services. 

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

Scattered Spider’s social engineering tactics are breaching enterprise defenses

🚨 Scattered Spider’s social engineering tactics are breaching enterprise defenses

📞 Cybercriminals are impersonating employees to manipulate IT help desks.

🔐 Tactics include fake IT messages, phishing links, and MFA fatigue attacks.

🛡️ AUMINT.io offers behavioral analytics and employee training to counter these threats.

📅 Protect your organization – consult with our experts today.

#CyberSecurity #SocialEngineering #AUMINTio #EnterpriseSecurity #MFAProtection

read more

Your network is being breached without malware

🚨 Your network is being breached without malware

🔍 79% of cyberattacks in 2024 were malware-free.

🛠️ Adversaries use legitimate credentials and native tools to infiltrate systems.

🧠 Traditional security measures are no longer sufficient.

🛡️ AUMINT.io offers proactive threat hunting and advanced analytics to detect and neutralize these threats.

📞 Fortify your defenses – consult with our experts today.

#CyberSecurity #ThreatHunting #AUMINTio #NetworkSecurity #MalwareFreeAttacks

read more

AI-crafted phishing emails are slipping past your inbox defenses

🚨 AI-crafted phishing emails are slipping past your inbox defenses

📧 In 2024, a malicious email bypassed traditional defenses every 42 seconds.
🤖 Attackers use AI to craft emails that mimic internal communications and replicate authentic threads.

🔄 Polymorphic tactics alter email elements in real-time to evade detection.
🛡️ AUMINT.io combines expert-supervised AI with behavioral analysis for advanced threat detection.

📞 Fortify your defenses – consult with our experts today.

#CyberSecurity #Phishing #AIThreats #AUMINTio #EmailSecurity

read more