In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
💬 “Our security is fine.”
❌ Dangerous last words from a board member.
🧩 Many orgs think they’re safe because they haven’t been breached. But hackers exploit confidence gaps.
📊 85% of board members feel aligned with CISOs. Only 65% of CISOs agree.
💥 That disconnect = corporate blind spot.
🛡️ AUMINT.io facilitates alignment – with real-time threat visibility and communication frameworks.
📆 Start the conversation: https://calendly.com/aumint/aumint-intro
💬 What causes disconnects between boards & security leaders? Add yours 👇
🔎 #CyberCulture #BoardCISO #SecurityCommunication #AUMINT
The EU Cyber Resilience Act Is Coming – Are You Ready for the Human Risk Factor?
🛡️ EU Cyber Act Demands More Than Just Secure Code
🚨 The new Cyber Resilience Act holds you liable for human-triggered breaches
🔐 It’s not just about software – it’s about who clicks what and when
👀 Most companies miss the human risk layer in their compliance plans
🧠 AUMINT.io’s Trident platform trains your people like real attackers would
📅 Add human-layer defense to your CRA plan
#CyberResilienceAct #EUCompliance #SocialEngineering #HumanFirewall #CyberSecurityTraining #AUMINT
The Midnight Blizzard Is Back – Why Spear Phishing Is Now Europe’s Diplomatic Cyber Nightmare
🎯 New Cyber Threat Targets Diplomats – You Might Be Next
🚨 Midnight Blizzard is spear phishing European diplomatic staff with alarming precision
📨 These attacks look like authentic internal emails with invisible malware payloads
🌍 If your company deals with international clients, you’re already a target
🛡️ AUMINT.io trains your people using real-world threat simulations
📅 Book a training preview today before the next phishing round hits
#SpearPhishing #CyberSecurityAwareness #AUMINT #HumanFirewall #DiplomaticCyberThreat #TridentSecurity