In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.

Nefilim Ransomware Attack Used “Ghost” Credentials.

According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services. 

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

Mobile Devices: The New Frontline in Enterprise Cybersecurity

📱 Mobile Devices: The New Frontier in Cybersecurity

In 2025, mobile devices have become the primary attack vector for cybercriminals targeting enterprises.

Cybercriminals are exploiting mobile platforms through sophisticated methods such as PDF phishing, vishing, and smishing.

These developments underscore the urgent need for enterprises to reevaluate their cybersecurity strategies, emphasizing mobile threat defense and employee awareness.

At AUMINT.io, we offer real-time simulations and training to help organizations identify and address mobile vulnerabilities proactively.

👉 Book your free strategy session to learn how AUMINT.io can fortify your mobile security posture.

#CyberSecurity #MobileSecurity #EnterpriseSecurity #Phishing #AUMINT

read more

Cybersecurity Vulnerabilities in 2025 – Are You Ready for the Surge?

🔐 Cybersecurity Vulnerabilities in 2025 – Are You Prepared?

In 2025, cybercrime is projected to cost the global economy $10.5 trillion annually – a 15% increase from the previous year. Over 30,000 vulnerabilities were disclosed last year, a 17% rise from previous figures. Cloud environment intrusions increased by 75%, and cloud-conscious cases saw a 110% rise over the past year.

Despite technological advancements, 88% of cybersecurity breaches are caused by human error. The average cost of a data breach reached $4.88 million in 2024, the highest average on record.

At AUMINT.io, we offer real-time simulations and training to help organizations identify and address vulnerabilities before they are exploited. Our platform enhances your organization’s resilience against cyber threats and ensures a proactive approach to cybersecurity.

👉 Book your free strategy session to learn how AUMINT.io can help you stay ahead of cyber threats.

#CyberSecurity #VulnerabilityManagement #DataBreach #CloudSecurity #HumanError #CyberThreats #AUMINT

read more

Power Parasites Unmasked – How Energy Giants Became Phishing Bait

⚡ Energy Giants Under Siege – Power Parasites Exposed

⚡ Since 2024, a phishing campaign known as Power Parasites has targeted global energy brands, harvesting credentials through fake job and investment sites.

⚡ Attackers mimic trusted logos and publicly‑known projects, creating near‑perfect clones that bypass technical defenses by exploiting human trust.

⚡ Victims enter their login details thinking they’re applying for a role or reviewing a deal – only to hand over the keys to their accounts.

⚡ No brand is too big to be duped – your company could be next if employees aren’t prepared.

⚡ Trident by AUMINT.io brings you adaptive, sector‑specific simulations so your people learn to spot these deceptions in real time.

⚡ Get live insights into who’s at risk and reinforce secure habits with continuous feedback loops.

👉 Book your free strategy session to transform your human firewall from vulnerable to virtually impenetrable.

#CyberSecurity #EnergySector #CISO #PhishingAwareness #SocialEngineering #HumanRisk #SecurityLeadership

read more