In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.

Nefilim Ransomware Attack Used “Ghost” Credentials.

According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services. 

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

The Identity Protection Maturity Myth That Leaves Enterprises Exposed

🔐 Identity Protection Maturity Is a Dangerous Illusion

⚠️ Many enterprises think they’re secure because they’ve deployed MFA, SSO, and identity tools – yet attackers still slip through.

😱 The shocking truth is that cybercriminals rarely need to hack the technology. They exploit the human layer by convincing employees to “approve” fraudulent requests or reset access controls.

📊 This maturity myth creates a false sense of safety. Dashboards look green, executives feel reassured, but real-world breaches prove otherwise.

💡 Identity protection is not about checkboxes – it’s about resilience against manipulation. The missing piece is continuous, real-world simulations that train employees to recognize and resist these tactics.

🚨 Without this, one compromised account can give attackers the keys to the kingdom.

👉 AUMINT.io’s Trident platform equips teams with tailored, evolving simulations that turn the human factor into your strongest defense.

📅 Book your intro session here
and learn how to close the human gap in your security strategy.

#CISO #CEO #CFO #CyberSecurity #FraudPrevention #IdentitySecurity #AwarenessTraining

read more

91 Million Lost to a Social Engineering Bitcoin Scam – How to Protect Your Assets

🚨 $91 Million Lost to Social Engineering in Crypto

⚠️ A high-profile investor fell victim to a meticulously executed Bitcoin scam, losing $91 million overnight.

💡 Fraudsters exploit trust and human error, bypassing even the most advanced technical safeguards.

🔍 Social engineering targets communication gaps, psychological triggers, and unsuspecting staff, making human vigilance the critical defense.

🛡️ AUMINT Trident simulates real-world attacks, training teams to detect deception, verify communications, and react under pressure, reinforcing human security layers.

📅 Protect your digital assets and organization before it’s too late: https://calendly.com/aumint/aumint-intro
.

#CryptoSecurity #CISO #SocialEngineering #FraudPrevention #InvestorProtection #BlockchainSecurity #ExecutiveProtection

read more

📱 Free Social Media Threat Monitors You’ll Want Today 📱

Social media is a goldmine for attackers – phishing, impersonation, and reputation attacks happen daily. The good news? There are free tools CISOs can use to monitor threats across social platforms.

Here are the top free social media threat monitoring tools:

1️⃣ Social Searcher – Real-time monitoring of mentions and suspicious activity on multiple platforms.
🔗 https://www.social-searcher.com/

2️⃣ Hootsuite Free Plan – Track brand mentions and identify unusual activity trends.
🔗 https://hootsuite.com/

3️⃣ Mention (Free Tier) – Alerts for unauthorized use of company names, logos, or campaigns.
🔗 https://mention.com/en/

4️⃣ TweetDeck – Monitor Twitter accounts, keywords, and potential threat signals.
🔗 https://tweetdeck.twitter.com/

5️⃣ CrowdTangle (Free Access for Media/Research) – Detects viral content, misinformation, and brand impersonation.
🔗 https://www.crowdtangle.com/

6️⃣ Brand24 Free Plan – Track public social mentions and potential threats.
🔗 https://brand24.com/

7️⃣ Google Alerts – Simple yet powerful tool for monitoring social mentions and URLs.
🔗 https://www.google.com/alerts

⚡ Using these tools, CISOs can spot phishing campaigns, impersonation attempts, and emerging social engineering tactics before they reach employees or customers.

At AUMINT.io, we complement technical monitoring with simulated social engineering attacks, testing how employees react when attackers exploit social channels.

🔗 Want to see how your workforce responds to social media threats? Book a free demo

#SocialMediaSecurity #CISO #CyberSecurity #ThreatMonitoring #AUMINT

read more