In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
Digital Doppelgangers: How Impersonation Threats Are Reshaping Enterprise Security
🚨 Digital Impersonation Is the New Enterprise Threat
😱 Attackers are no longer just hacking systems – they are pretending to be your trusted colleagues.
📧 From cloned emails to fake profiles on collaboration tools, digital impersonation exploits human trust, bypassing traditional security defenses.
⚡ Employees may unknowingly share sensitive data, approve fraudulent transactions, or introduce malware, leaving minimal digital traces.
🔑 Technical controls aren’t enough – awareness, simulation, and real-world social engineering exposure are critical.
💡 AUMINT.io’s Trident platform simulates sophisticated impersonation attacks, training teams to detect and respond before real damage occurs.
📅 Book your intro session here
and strengthen your human firewall today.
#CISO #CTO #CyberSecurity #FraudPrevention #AwarenessTraining #EnterpriseSecurity
🌐 Free Botnet Tracker Sites Revealing Global Attack Trends 🌐
Botnets continue to power a huge percentage of cyberattacks worldwide, from DDoS campaigns to malware distribution. For CISOs, tracking them early is crucial – and several free resources make this possible.
Here are the top free botnet tracker sites:
1️⃣ Abuse.ch – Feodo, Zeus Tracker – Tracks active banking malware and botnets.
🔗 https://abuse.ch
2️⃣ Shadowserver Foundation – Provides free daily reports on botnet infections globally.
🔗 https://www.shadowserver.org/
3️⃣ Spamhaus Botnet Threat Feeds – Lists IPs and domains associated with botnet activity.
🔗 https://www.spamhaus.org/
4️⃣ Zeus Tracker (via Abuse.ch) – Specific tracking for Zeus botnet variants.
🔗 https://zeustracker.abuse.ch/
5️⃣ Botvrij.eu – Real-time botnet detection and reporting for European networks.
🔗 https://botvrij.eu/
6️⃣ Malwaredomainlist.com – Monitors botnet command-and-control servers and malicious domains.
🔗 https://www.malwaredomainlist.com/
7️⃣ Emerging Threats (ET Open) – Network threat intelligence including botnet activity feeds.
🔗 https://rules.emergingthreats.net/
⚡ Using these free trackers, CISOs can spot emerging threats, update defenses, and strengthen SOC responses before attacks escalate.
At AUMINT.io, we complement technical monitoring with simulations of social engineering attacks that exploit human weaknesses, revealing the full picture of organizational exposure.
🔗 Want to see how your employees respond to botnet-driven phishing or social attacks? Book a free demo
#BotnetTracking #CISO #CyberSecurity #ThreatIntelligence #AUMINT
Lazarus Turns GitHub Into a Playground for Social Engineering
🚨 Lazarus Just Hijacked GitHub Trust at Scale
😱 Over 50 fake GitHub accounts tied to Lazarus were uncovered, showing just how far attackers will go to weaponize collaboration.
👩💻 Instead of brute-forcing systems, they posed as developers and researchers, embedding themselves into trusted networks.
⚡ The danger wasn’t the code – it was the psychology. By pretending to be “one of us,” they tricked professionals into lowering their guard.
🔑 This exposes a blind spot: technical tools can’t stop employees from trusting the wrong collaborator. Awareness and simulation are the only way to prepare.
💡 AUMINT.io’s Trident platform gives organizations the power to safely experience and counter these tactics before attackers exploit them.
📅 Book your intro session here
and close the human gap in your defenses today.
#CISO #CTO #CyberSecurity #FraudPrevention #AwarenessTraining #Developers