In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
🧩 OT Security Without Segmentation? That’s a Door Left Wide Open.
🚪 Hackers broke into Lviv’s heating utility via exposed IT – then walked right into OT.
🌡️ 600 buildings lost heat for 2 days. No segmentation. No detection.
🔍 That’s not bad luck – that’s bad governance.
💡 Boards must prioritize secure architecture – with OT/IT segmentation baked in.
🛡️ AUMINT.io delivers secure-by-design playbooks and simulations tailored for directors.
📆 Get your playbook: https://calendly.com/aumint/aumint-intro
💬 Ever seen an OT disaster coming from miles away? Tell us how 👇
🔎 #CyberArchitecture #BoardResilience #AUMINT
Why Microsoft’s New Secure Future Initiative Won’t Be Enough Without You
🛡️ Microsoft’s Secure Future Won’t Secure Your People
📢 Microsoft’s new “Secure Future Initiative” is a powerful pivot – stronger engineering, more AI-driven threat detection, tighter controls. But…
🚨 None of it stops a user from clicking the wrong link.
🧠 Social engineering still bypasses the smartest tech. Why? Because humans trust, skip, forget, and fall for what feels safe.
🔐 AUMINT.io’s Trident platform fills the human gap: – Simulates ultra-targeted phishing + impersonation – Rewires reflexes through adaptive training – Shows CISOs where the next breach might start
📊 90% of breaches still involve human behavior. Microsoft can’t fix that. You can.
💬 Book your intro now – before a smart user becomes your weakest link.
#SecureFuture #CISO #HumanFirewall #SecurityAwarenessTraining #SocialEngineering #MicrosoftSecurity #TridentByAUMINT
Weaponized Trust – How Hackers Are Turning Certificates Against You
🔐 Hackers Are Signing Malware With Trusted Certificates
⚠️ They’re no longer brute-forcing their way in – they’re using stolen private keys and signing certificates to slip past your defenses.
📦 Signed malware now looks safe to: – Antivirus – EDR systems – Users
💥 This isn’t just technical – it’s psychological. Users are trained to trust “Verified” files. And that’s exactly what attackers exploit.
🧠 AUMINT.io’s Trident platform breaks the false trust cycle: – Simulates realistic attack behaviors – Conditions users to question what looks legit – Provides CISOs with real-time risk insights
🎯 When malware hides behind a trusted certificate, your last line of defense is human instinct. Train it with Trident.
💬 Book your intro call – before trust gets weaponized against you.
#CyberResilience #StolenCerts #HumanFirewall #CISO #SecurityAwarenessTraining #TridentByAUMINT #SocialEngineeringDefense #SignedMalware