In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
Fake Meta Ads and Android Malware: The Rising Threat to Users and Organizations
🚨 Fake Ads Are Spreading Android Malware Faster Than Ever
Attackers are using fake Meta ads to trick users into downloading Brokewell malware.
This malware gains device access, steals sensitive data, and bypasses traditional defenses.
The risk extends to organizations – infected employee devices can compromise networks and confidential data.
Human trust is being exploited – social engineering tactics are central to these attacks.
AUMINT.io fortifies your human layer with simulations, training, and monitoring dashboards to prevent infections.
Secure your organization and empower employees: Book Your AUMINT.io Intro
.
#CISO #CTO #CyberSecurity #EnterpriseSecurity #SocialEngineering #ITSecurity
Ransomware Is Targeting Your IT and OT Systems – Are You Prepared?
⚠️ Ransomware Is Targeting Both IT and OT
Ransomware attacks are now exploiting the convergence of IT and OT networks, hitting operational systems and business IT simultaneously.
Legacy OT devices often lack modern security, creating easy entry points for attackers.
Once inside, ransomware can propagate across networks, locking critical systems and threatening operations.
Human error and social engineering remain top vulnerabilities, with attackers leveraging AI-enhanced tactics to deceive employees.
Many organizations are underprepared – insufficient monitoring, outdated protocols, and lack of employee awareness leave critical systems exposed.
AUMINT.io provides advanced simulations, training, and real-time dashboards to help teams detect, respond, and prevent ransomware attacks across IT and OT systems.
Protect your organization before it’s too late – Book Your AUMINT.io Intro
.
#CISO #OTSecurity #CyberSecurity #SocialEngineering #ITLeaders #IndustrialSecurity
Storm0501 Ransomware Exploits Azure Cloud Vulnerabilities
⚠️ Storm0501 Ransomware Hits Azure Cloud
Attackers are exploiting Azure cloud vulnerabilities with Storm0501 ransomware, encrypting data and demanding ransoms.
Organizations face severe disruption as backups and critical processes are targeted.
Cloud-specific weaknesses like misconfigured storage and weak authentication make these attacks more effective.
Human error remains a key vulnerability – even sophisticated clouds can be compromised if employees are unprepared.
AUMINT.io strengthens human defenses with simulations, tailored training, and dashboards to prevent ransomware escalation.
Secure your cloud environment and empower your team: Book Your AUMINT.io Intro
.
#CISO #CTO #CyberSecurity #CloudSecurity #EnterpriseSecurity #SocialEngineering #ITSecurity