In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
The Hidden Cyber Threat Lurking in Restaurants: Social Engineering Fraud and Tax Season Scams
Every year, tax season brings a surge in cyber threats, but one of the most overlooked industries at risk is the restaurant business. While restaurateurs focus on managing operations, hiring staff, and delivering great customer experiences, cybercriminals are...
The AI Cyberattack Crisis: Why Senior Leaders Are Overestimating Their Security Readiness
Artificial intelligence is revolutionizing industries, but it’s also becoming a weapon in the hands of cybercriminals. Recent research shows that AI-powered attacks are not just a future concern – they’re happening right now, and most organizations are unprepared....
Ransomware Strikes Again: How the Virginia AG Office Hack Exposes a Growing Cybersecurity Crisis
Cybercriminals are getting bolder, and the latest ransomware attack on the Virginia Attorney General’s Office is a stark reminder that no organization is safe. In this breach, attackers leaked 134GB of sensitive data, potentially compromising legal records, government...