In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.

Nefilim Ransomware Attack Used “Ghost” Credentials.

According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services. 

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

European Cybersecurity Month focuses on social engineering

Throughout the month of October, the EU holds their annual cybersecurity campaign which focuses on promoting cybersecurity among EU citizens and organisations. This is done through various activities including conferences, workshops, training and webinars.  This...

read more

Are governments prepared for cyber attacks?

Private companies aren’t the only target for cyber criminals. As we’ve seen in the past with attacks to major public infrastructure, such as the Colonial Pipeline in the US in May 2021, and public services, like the Wannacry attack on the NHS in 2017, threat actors...

read more

The latest browser-based social engineering trend

As governments and companies become aware of cyber threats and close the door on certain methods, cyber criminals are constantly evolving to find a new way to attack.  The latest example, according to a recent report by WatchGuard, is a new type of browser-based...

read more