In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.

Nefilim Ransomware Attack Used “Ghost” Credentials.

According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services. 

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

🧨 When Operational Technology Fails, It’s Not Just Downtime – It’s Disaster

🚰 Water plants. 🏥 Hospitals. ⚡ Grids.

💥 One successful Operational Technology breach = cascading chaos.

🧠 Boards must treat Operational Technology the way they treat financial or legal risk: with oversight, testing, and response planning.

🛡️ AUMINT.io brings that discipline to Operational Technology – with board-grade briefings, red team exercises, and risk roadmaps.

📆 Get your custom Operational Technology strategy session: https://calendly.com/aumint/aumint-intro

💬 What critical system do you think is most at risk? 👇

🔎 #CriticalInfrastructure #Operational TechnologySecurity #BoardOversight #AUMINT

read more

Google Forms: The New Frontier for Phishing Attacks

🚨 Google Forms: The New Tool for Phishing Attacks

📧 Cybercriminals are now leveraging Google Forms to create deceptive phishing campaigns that bypass traditional email security filters.

🔗 These malicious forms, hosted on Google’s own domain, mimic legitimate login pages, tricking users into revealing sensitive credentials.

🛡️ AUMINT.io’s Trident platform addresses this threat by:

Simulating real-world phishing attacks to train employees.

Providing CISOs with insights into human risk factors.

Enhancing organizational resilience against social engineering tactics.

📈 Empower your team to recognize and thwart these sophisticated attacks.

👉 Schedule your free strategy session with AUMINT.io today and strengthen your organization’s human firewall.​

#CyberSecurity #Phishing #GoogleForms #EmployeeTraining #AUMINT #CISO

read more

🔦 Compliance ≠ Preparedness

✅ You passed an audit.

💥 But what happens when a real attack hits your Operational Technology layer?

🧪 Simulation reveals what a checklist never will: how people, systems, and decisions perform under pressure.

📉 And in most cases? It’s a wake-up call.

🛡️ AUMINT.io delivers high-impact Operational Technology breach simulations designed for board-level insights.

📆 Want to try one? Book here: https://calendly.com/aumint/aumint-intro

💬 What’s a myth your board believes about cyber readiness? 👇

🔎 #CyberPreparedness #BoardSecurity #OTSimulation #AUMINT

read more