In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.

Nefilim Ransomware Attack Used “Ghost” Credentials.

According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services. 

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

Social Engineering in 2025 Is Smarter, Faster and More Dangerous – Here’s How to Stay Ahead

🚨 Social Engineering in 2025 Has Become Almost Invisible

🤖 Attackers are using AI to mimic executives’ voices, craft perfect emails, and even deploy chatbots that impersonate IT staff.

📈 These manipulations aren’t random – they’re precision attacks tailored to your workflows, relationships, and business culture.

⚡ The result: employees feel pressured into quick decisions that open the door for attackers without a single firewall being touched.

🛡️ Traditional defenses stop code, but not trust. That’s why human resilience is now the frontline of cybersecurity.

💡 AUMINT.io’s Trident platform simulates real-world deepfake calls, fake vendor requests, and spear phishing campaigns to train employees in realistic, recurring cycles.

📅 The smartest defense in 2025 is preparing your people before attackers reach them. Book your intro session here
to safeguard your team now.

#CISO #CTO #CEO #CyberSecurity #FraudPrevention #EmployeeTraining #Deepfakes

read more

Back-to-School Scams Every Parent and Educator Needs to Know

🎒 Back-to-School Scams Are Smarter Than Ever

⚡ Parents rushing to grab deals on laptops are unknowingly entering fake stores.

⚡ Students eager for “free resources” are handing over personal data to cybercriminals.

⚡ Schools themselves are receiving fake vendor invoices that slip past busy staff.

This is not just about money – identity theft, compromised accounts, and system-wide breaches are all on the rise during back-to-school season.

🚨 What makes these scams so effective? They exploit urgency and trust at the very moment when families, students, and schools are most distracted. Attackers count on you being too busy to notice the red flags.

💡 Cyber awareness has to be on the checklist, right next to backpacks and books. That’s why recurring, human-focused simulations are the fastest way to spot vulnerabilities before attackers do.

🔒 At AUMINT.io, we design simulations that reveal real risks and help strengthen defenses where they matter most.

👉 Want to see how it works? Secure your spot for a quick intro here: Book a Call
.

#CyberSecurity #SocialEngineering #FraudPreventionb #CISO #CIO #ITSecurity #SchoolSafety #EdTech

read more

Why Retailers Are Prime Targets for Cyberattacks – And How to Defend Smarter

🛒 Retail Cyberattacks Are Rising Faster Than You Think

⚠️ Attackers are targeting the very systems that keep retail moving – from point-of-sale to vendor integrations.

📧 Social engineering scams are exploiting frontline employees with disguised vendor requests and fake system updates.

🔓 Once inside, criminals move fast, stealing customer records and damaging trust before anyone notices.

💡 Retailers cannot rely on technology alone – human behavior is the entry point for most breaches.

🛡️ AUMINT.io’s Trident platform empowers retail teams with tailored simulations, preparing employees to detect and stop manipulations before damage occurs.

📅 Resilience starts with training your people. Book your intro session here
to safeguard your retail operations now.

#CISO #CTO #CyberSecurity #Retail #FraudPrevention #EmployeeTraining #DataSecurity

read more