In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
Whaling Attacks: The Growing Threat to Corporate Executives
Cybercriminals are no longer just after low-hanging fruit. They’re targeting the biggest fish in the sea – C-suite executives, high-ranking officials, and decision-makers in major corporations. This sophisticated form of cyberattack, known as whaling, is a highly...
The Growing Threat of Supply Chain Social Engineering: How Cybercriminals Are Targeting Your Business
In recent years, one of the most concerning trends in cybersecurity has been the rise of supply chain attacks – and more specifically, supply chain social engineering. Cybercriminals are increasingly leveraging these tactics to infiltrate organizations by exploiting...
Global Cyber Heist: How Fake CRM Apps Are Hijacking Banking Credentials
The Rise of a Silent Cyber Heist Imagine landing what seems like a golden career opportunity – a recruiter reaches out with an exclusive role, promising a high-paying position at a reputable company. The interview process moves quickly, and everything looks...