In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
Beware: Cybercriminals Exploit Free Online File Converters to Spread Malware
The Hidden Danger Behind Free Online Tools In today's digital landscape, convenience often comes at a hidden cost. The FBI Denver Field Office has issued a warning about a rising scam involving free online document converter tools. While these tools promise to convert...
The ‘Dream Job’ Cyber Trap: How North Korean Hackers Are Targeting Job Seekers
When a Job Offer Becomes a Cybersecurity Nightmare Imagine being approached on LinkedIn by a recruiter from a top aerospace company. They offer an exclusive, high-paying role that seems too good to pass up. You exchange messages, maybe even have a phone call. Then,...
Cybersecurity in 2025: The Biggest Threats Shaping the Digital Battlefield
A Year of Unprecedented Cyber Warfare The cybersecurity landscape has entered a new era – one marked by rapid attack speeds, sophisticated deception tactics, and a surge in global cyber threats. The 2025 Global Threat Report from CrowdStrike reveals a shocking...