In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
Securing Executive Transitions: Digital Risks You Can’t Ignore
🛡️ Executive Transitions Can Expose Critical Digital Risks
⚡ Onboarding and offboarding executives is a high-risk period for data leaks and insider threats.
⚡ New executives can unintentionally access sensitive systems before understanding security protocols.
⚡ Departing executives may retain access, creating opportunities for exploitation.
Targeted social engineering attacks often exploit these gaps, making human behavior the weakest link during transitions.
🛡️ AUMINT.io’s Trident platform simulates these scenarios safely, identifying vulnerabilities and training teams to strengthen defenses.
👉 Ensure your executive transitions are secure and resilient. Book a call today
.
#CyberSecurity #ExecutiveRisk #SocialEngineering #InsiderThreats #CISO #CIO #BoardDirectors #ITSecurity #CyberResilience
Why Command and Control Channels Are the Silent Lifeline of Cybercriminals
🕵️ Hidden Lifelines: Why Command-and-Control Channels Matter Most
⚡ Every big cyberattack has a secret backbone – the command-and-control (C2) channel.
⚡ Once inside your network, compromised machines start “calling home,” awaiting attacker instructions. These hidden channels let hackers exfiltrate data, spread laterally, and trigger ransomware at scale.
⚡ The scary part? C2 traffic often looks like ordinary web requests or encrypted sessions. Attackers blend in with normal business activity to avoid detection.
⚡ And thanks to packaged frameworks, even low-skill attackers can now access powerful C2 tools.
⚡ Firewalls and antivirus alone cannot stop what appears legitimate. Detecting and disrupting C2 demands behavioral analytics and a human-aware workforce.
⚡ That’s where AUMINT.io’s Trident platform steps in – teaching employees how attackers plant the human entry points that fuel C2 control.
⚡ Ready to cut off the lifeline attackers depend on? Book your session today
.
#CISO #CTO #CFO #CEO #CyberSecurity #RiskManagement #FraudPrevention
PromptLock: The AI Security Risk Hiding in Plain Sight
🤖 AI Security Risks You Can’t Ignore
⚡ PromptLock exposes a hidden vulnerability in AI assistants that can leak sensitive business information.
⚡ Employees interacting with AI may unknowingly trigger data leaks without realizing it.
⚡ Traditional cybersecurity measures often overlook AI-based social engineering threats.
The most alarming part: attacks can scale across departments simultaneously, targeting human-AI interaction points.
🛡️ AUMINT.io’s Trident platform simulates these AI exploitation scenarios safely, helping teams strengthen defenses before real attacks occur.
👉 Want to test your organization’s resilience against AI-driven social engineering? Book a call today
.
#CyberSecurity #AIThreats #SocialEngineering #FraudPrevention #CISO #CIO #BoardDirectors #ITSecurity #CyberResilience