In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
Attention🚨A wave of attacks that began yesterday using Watering Hole on hundreds of websites
Here are the technical details for your convenience: An attacker found a way to enter the Cloudflare management interface, which is used to protect websites, and by defining a new Worker in the interface, he's injecting sophisticated Javascript code that is very...
Business Email Compromise on the Rise: The $2.9 Billion Threat to Corporate Security
The Silent Heist Costing Companies Billions It starts with a simple email – one that looks just like the hundreds you receive daily from your manager, a trusted vendor, or a long-time business partner. There’s no obvious red flag. The writing style matches, the tone...
🚨Are we on the brink of a cyber-war?🚨
📢 What happened? An allegedly Chinese-sponsored hacker group carried out a sustained cyberattack (2021-2023) on the Belgian State Security Service (VSSE), stealing sensitive information.The hackers exploited a vulnerability in Microsoft Exchange servers...