In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.

Nefilim Ransomware Attack Used “Ghost” Credentials.

According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services. 

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

Why Behaviour Will Decide Your Next Cybersecurity Breach

🎯 Behaviour, Not Tools, Will Trigger Your Next Breach

🧠 Nearly 60 percent of cyber breaches stem from human error, manipulation, or misuse. Technology alone won’t prevent the next incident.

🎭 AI is fueling social engineering – convincing deepfake videos or flawless emails fool even trained employees.

💥 What if your defence could catch risks before they escalate? Human risk analytics does just that – spotting unusual patterns, injecting friction, and nudging users toward safer action.

👥 At AUMINT.io, we don’t just teach – we simulate real-world attacks in flow, track real behaviours, and help teams build instincts to spot deception before damage is done.

👉 Don’t guess how your people will respond under pressure. Book your session now
and build a behaviour-based defence.

#CISO #CIO #CyberSecurity #HumanRisk #SocialEngineering #SecurityOps

read more

CatWatchful Data Leak 2025 – What Every Organization Must Know

🔒 Hidden Data Leaks Could Cost Your Organization Millions

🚨 The CatWatchful 2025 data leak shows that overlooked platforms can expose critical information to cybercriminals.

💡 Attackers exploit low-profile systems and third-party services, turning minor data into major security threats.

👥 Human error remains a top vulnerability – weak passwords, poor authentication, and mismanaged permissions create easy entry points.

✅ AUMINT.io uncovers these hidden risks with simulated social engineering, continuous monitoring, and targeted employee training.

📈 Don’t wait for your organization to be the next headline – Book your session today
and proactively secure your systems.

#CISO #CTO #CIO #CyberSecurity #SocialEngineering #RiskManagement #FraudPrevention

read more

Cognizant Password Reset Incident – Lessons in Cybersecurity Vigilance

⚠️ Password Resets Can Make or Break Your Security

🚨 The Clorox-Cognizant incident shows how overlooked password reset procedures can open doors for attackers.

💡 Even trusted IT partners can create vulnerabilities if protocols aren’t strictly followed.

👥 Human error magnifies risk – employees and contractors following flawed procedures can unintentionally expose critical systems.

✅ AUMINT.io helps organizations detect and remediate hidden vulnerabilities through simulated attacks, behavioral monitoring, and continuous oversight.

📈 Don’t wait for legal or reputational fallout – Book your session now
and fortify your defenses before gaps are exploited.

#CISO #CTO #CIO #CyberSecurity #FraudPrevention #RiskManagement

read more