In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.

Nefilim Ransomware Attack Used “Ghost” Credentials.

According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services. 

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

Partnering for Compliance: Why the Right IT Ally is Crucial in the EU Regulatory Landscape

🔐 Navigating EU Compliance: The Strategic Role of IT Partnerships

As EU regulations like DORA, NIS2, MiCA, and the EAA reshape the business landscape, compliance has become a technical imperative. Organizations must now integrate regulatory requirements directly into their IT infrastructure.

Choosing the right IT partner is crucial to:

Implement compliant systems.

Conduct risk assessments and resilience testing.

Ensure digital accessibility.

Stay ahead of regulatory changes.

Proactive compliance not only mitigates risks but also offers a competitive advantage by enhancing operational efficiency and building client trust.

#EUCompliance #ITPartnership #DigitalResilience #CyberSecurity #RegTech

read more

🔐 Stop Hackers Before They Start

Attackers target what you don’t see.

Employee data leaks, forgotten servers, weak endpoints.

AUMINT’s report maps your full attack surface for €1,500.

Don’t wait to get breached.

Book your security snapshot: https://calendly.com/aumint/aumint-intro

#CyberSecurity #AttackSurface #CISO #InfoSec #SOC #RiskManagement #AUMINT

read more

DORA Compliance: What Tech Vendors Need to Know

🔐 Navigating DORA: Essential Insights for Tech Vendors

The Digital Operational Resilience Act (DORA) is reshaping how tech vendors engage with EU financial institutions.

Key Points:

DORA applies to all ICT service providers supporting EU financial entities, regardless of location.

Vendors may face direct regulatory oversight or contractual obligations based on the criticality of their services.

Contracts must encompass specific clauses on security, incident response, and audit rights.

Non-compliance risks include regulatory sanctions and loss of business.

At AUMINT.io, we assist tech vendors in achieving DORA compliance through comprehensive cybersecurity strategies.

Book a Consultation with AUMINT.io

#CyberSecurity #DORA #TechVendors #AUMINT

read more