In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
The Hidden Weakness in MSP & MSSP Security: Attack Surface Blind Spots You Can’t Ignore
Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) are on the front lines of cybersecurity, protecting businesses from an ever-evolving wave of threats. But what if the greatest risk isn’t an external hacker or ransomware attack – but...
The Hidden Cybersecurity Risk of ‘No-Reply’ Emails: Why Ignoring Them Could Be Dangerous
In today's digital world, we all know the importance of email as a communication tool. But what happens when that email comes from a 'no-reply' address? You might think it's harmless, a simple automated message that doesn't require action. However, the rise of...
Browser Security Under Siege: The Alarming Rise of AI-Powered Phishing
The landscape of online security is shifting – and not for the better. Browser security, once thought to be a stronghold against cyberattacks, is now facing an unprecedented challenge. The culprit? AI-powered phishing. These advanced attacks leverage artificial...