In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
The Alarming Rise of Social Engineering Attacks in 2025 – Why No One Is Safe
🎯 Social Engineering Surge – Are Your People Ready?
🚨 The first half of 2025 has seen a sharp rise in social engineering attacks – and they’re more convincing than ever.
💥 Criminals are using AI, deepfakes, and hyper-realistic phishing to impersonate executives, trick employees, and bypass even strong technical defenses.
🕵️ No sector is safe – from small businesses to government agencies, attackers target anyone who can be pressured into a quick decision.
⚠️ The most dangerous myth? Thinking “our staff would never fall for this.” Even trained employees can be manipulated under the right pressure.
📊 Prevention starts with continuous awareness training, phishing simulations, and clear reporting channels – combined with real-time monitoring to detect early signs of an attack.
📢 The weakest link is often human, but with the right approach, your people can become your strongest defense. Book your AUMINT.io consultation today.
#CyberSecurity #SocialEngineering #Phishing #FraudPrevention #RiskManagement #CISOs #ITSecurity #DataProtection
🎓 CISOs: Free Security Awareness Training Platforms to Recommend 🎓
Training your workforce is your best defense against phishing, social engineering, and insider threats. Yet, budgets are tight and training fatigue is real.
Here’s a list of free security awareness training platforms that deliver quality content and engagement without costing a dime:
1️⃣ Cybrary – Offers foundational security courses and phishing awareness modules.
https://www.cybrary.it/
2️⃣ Infosec Skills Free Tier – Access select awareness courses and phishing simulations at no cost.
https://www.infosecinstitute.com/skills/
3️⃣ KnowBe4 Free Phishing Security Test – Quick assessment tool to benchmark your team’s phishing susceptibility.
https://www.knowbe4.com/phishing-security-test
4️⃣ Google Phishing Quiz – Interactive quiz for users to spot phishing attacks.
https://phishingquiz.withgoogle.com/
5️⃣ Sans Security Awareness Free Resources – Videos, posters, and tips to complement training efforts.
https://www.sans.org/security-awareness-training/resources/free-resources
6️⃣ Open Security Awareness – Open-source, customizable awareness training modules for teams.
https://opensecurityawareness.org/
7️⃣ MetaPhish Free Plan – Basic phishing simulation and training platform for small teams.
https://metaphish.com/free-phishing-simulation
Empowering your employees with the right knowledge builds your strongest defense layer.
Want to amplify your training with real-world social engineering attack simulations that reveal hidden risks?
📅 Book a free AUMINT.io intro call: Schedule here
💡 Save this post and recommend these platforms to your security champions!
#CISO #SecurityAwareness #PhishingTraining #HumanRisk #AUMINT
The Hidden Insider Threat You’re Probably Ignoring – Ex-Employee Password Access
🔑 Ex-Employees Still Have Your Passwords – And They’re Using Them
🚨 Many workers admit they’ve logged in to former employers’ accounts after leaving – and sometimes months later.
💥 It’s a silent insider threat that bypasses firewalls and phishing filters entirely.
🕵️ The real danger? Credentials that stay active long after offboarding, often with access to sensitive systems, customer data, or financial platforms.
⚠️ In some cases, ex-staff under strained exits can exploit this for sabotage or even sell access on the dark web.
📊 Even “friendly” departures can lead to accidental leaks if accounts aren’t properly closed.
🔍 The fix? Immediate credential deactivation, MFA, and ongoing account audits to spot dormant access before it’s abused.
📢 Your next security breach could come from someone who already knows your systems. Book your AUMINT.io consultation today.
#CyberSecurity #InsiderThreats #AccessControl #FraudPrevention #RiskManagement #CISOs #ITSecurity #DataProtection