In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.

Nefilim Ransomware Attack Used “Ghost” Credentials.

According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services. 

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

Should weak passwords be banned?

Are you one of the millions of people still using “123456” as their password? According to password management company, NordPass, this has been used more than 4.5m times, and it takes less than 20 seconds to crack. But, in the UK, weak passwords will soon be a thing...

read more

Social engineering hides a backdoor in plain site

A recent incident where a backdoor was introduced into XZ Utils’ open-source software in plain sight shows how effectively malicious actors can use social engineering for their own gains.  What is XZ Utils? XZ Utils is a set of free software command-line lossless data...

read more

8 Cybersecurity predictions for 2024

Global technology research and consulting firm, Gartner, recently revealed their top eight cybersecurity predictions for the next few years. The way companies hire cybersecurity workers will change over the next few years as the adoption of generative AI will close...

read more