In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
Call Me Fake: Why Deepfakes Are a Growing Threat to Corporate Executives
🔍 Call Me Fake: Why Deepfakes Are a Growing Threat to Corporate Executives
What if the person on the other end of a business deal wasn’t real? Deepfake technology is making that nightmare a reality. AI-generated videos and voice clones are becoming dangerously convincing, allowing cybercriminals to impersonate executives, approve fraudulent transactions, and manipulate sensitive business decisions.
🚨 Executives are prime targets. With just one fake call, a company could lose millions. Traditional security measures aren’t enough – deepfake detection and multi-factor authentication are now essential.
🔐 Stay ahead of evolving cyber threats. Protect your organization with advanced security strategies. Book a consultation with AUMINT.io today.
#CyberSecurity #Deepfakes #ExecutiveRisk #AIThreats #FraudPrevention #DigitalTrust #CISO #CorporateSecurity #DeepfakeDetection
AI-Powered Cyberattacks Are Escalating – Is Your Business Ready?
Cybercriminals are no longer relying on traditional hacking methods. AI-driven cyberattacks have changed the game, making breaches faster, smarter, and harder to detect. If your business isn’t preparing for this new wave of threats, you’re already behind. A recent...
Meet DORA – The Regulation That’s About to Redefine Your Cybersecurity Strategy
If your organization isn’t prepared for DORA, you’re already falling behind. The Digital Operational Resilience Act (DORA) isn’t just another compliance requirement – it’s a game-changer for financial institutions, service providers, and any business that touches the...