In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.

Nefilim Ransomware Attack Used “Ghost” Credentials.

According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services. 

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

The Hidden Weak Link: Why Supply Chain Security Is the Ultimate Cyber Battleground

🔓 Your Supply Chain Is Your Biggest Cybersecurity Risk – Here’s Why

🚨 One weak vendor can take down your entire organization. The SolarWinds attack proved how cybercriminals infiltrate trusted software to unleash chaos. Are your third-party providers truly secure?

📉 Modern software dependencies are a hacker’s playground. Open-source libraries, APIs, and cloud services create invisible entry points for attacks like dependency confusion and repository hijacking.

🛡️ Proactive security is the only solution. ASPM helps monitor vulnerabilities, enforce zero-trust, and block threats before they strike. Is your security posture ready?

🔗 Act now – Secure your supply chain with AUMINT.io!

#Cybersecurity #SupplyChainSecurity #ASPM #CyberThreats #DataProtection

read more

The Silent Heist: How Email Fraud Is Costing Businesses Millions – And How to Stop It

📧 It starts with a simple email… and ends in a multi-million dollar loss. Cybercriminals are executing sophisticated Business Email Compromise (BEC) scams, mimicking trusted contacts to deceive employees. 🚨 FBI reports $50B+ lost worldwide!

🔍 Why are these scams so dangerous?
✅ They bypass traditional security – No malware, just social engineering.
✅ They exploit trust – Emails look real, urgent, and convincing.
✅ They target individuals – Attackers study internal email patterns.

🛡️ Protect your business NOW – Book a free consultation with AUMINT.io.

#CyberSecurity #EmailFraud #BEC #BusinessSecurity

read more

The 7 Phishing Attacks That Could Ruin Your Business – And How to Stop Them

🛑 Think phishing is just spam? Think again! Cybercriminals are using AI, deepfakes, and social engineering to trick even the most cautious professionals. One wrong click can cost millions.

🎯 Executives are prime targets – Whaling attacks manipulate C-suite leaders into transferring funds or leaking data.

📩 BEC scams are the costliest phishing threat – Attackers mimic real emails to authorize fraudulent payments.

🔍 Stay ahead of AI-powered phishing! Protect your business before it’s too late. Book a consultation with AUMINT.io today.

#CyberSecurity #Phishing #AI #InfoSec #CyberThreats

read more