In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
🕵️♂️ Free Threat Intel Feeds CISOs Secretly Rely On 🕵️♂️
Behind the scenes, most CISOs quietly tap into open-source threat intelligence feeds that rival paid platforms. Here are some that consistently deliver high value at zero cost:
1️⃣ Abuse.ch Feeds – Malware, ransomware, and botnet tracking (URLhaus, SSLBL, MalwareBazaar).
🔗 https://abuse.ch
2️⃣ AlienVault OTX – Community-driven IoCs with global sharing.
🔗 https://otx.alienvault.com
3️⃣ MISP Feeds – Indicators from the popular open-source threat sharing platform.
🔗 https://www.misp-project.org/feeds/
4️⃣ Cybercrime Tracker – C2 server tracking for malware families.
🔗 http://cybercrime-tracker.net
5️⃣ PhishTank – Verified phishing URLs submitted by the community.
🔗 https://phishtank.org
6️⃣ ThreatFox – IOC sharing platform focused on malware & threat actors.
🔗 https://threatfox.abuse.ch
7️⃣ Feodo Tracker – Botnet C2 feed with real-time updates.
🔗 https://feodotracker.abuse.ch
⚡These feeds fuel SOC alerts, enrich SIEM rules, and give CISOs a tactical edge without blowing the budget.
At AUMINT.io, we push this further – simulating how attackers test these same intel gaps against your employees through spear-phishing, vishing, and real-world deception. Because knowing about threats is one thing – training humans to resist them is the real defense.
🔗 Ready to test your human threat surface? Book a free demo
#ThreatIntelligence #CISO #CyberSecurity #AUMINT #FraudPrevention
How One Passenger Lost $17,000 to a United Airlines Scam – And What It Teaches Every Business About Fraud Prevention
✈️ $17,000 Gone Overnight – The United Airlines Scam Every Leader Must Understand
😱 A United Airlines passenger thought they were fixing a booking issue – instead, they lost $17,000 in hours.
🔎 Cybercriminals cloned support channels so well that the victim never realized they weren’t speaking with the real airline.
💡 Here’s the shocking part: the same tactic is already being used against employees, vendors, and executives. If one individual can be tricked so easily, imagine the risks inside an organization handling millions in transactions daily.
🚨 Attackers aren’t just sending clumsy phishing emails anymore. They use urgency, authority, and brand familiarity to manipulate human decisions. This isn’t a “tech” problem – it’s a human factor problem.
📊 For mid-market firms, one fraudulent transfer can create devastating financial and reputational damage. Prevention is no longer optional.
🔐 That’s where recurring simulation-driven training becomes critical. Employees need to recognize and resist these manipulations before real losses occur.
👉 AUMINT.io’s Trident platform equips businesses with ongoing, real-world attack simulations tailored to evolving threats.
💬 Are your teams ready for this type of attack? Or would they trust the fake “support line” too?
📅 Book your intro session here
and learn how to protect your organization before the next scam hits.
#CISO #CEO #CFO #FraudPrevention #CyberSecurity #AwarenessTraining #RiskManagement
Hackers Are Exploiting Help Desks to Breach Government Cyber Defenses
🚨 Help Desks Are the Hidden Cybersecurity Vulnerability
💡 Hackers are targeting government help desks to bypass even the strongest technical defenses.
⚠️ Social engineering exploits trust and urgency, turning routine support interactions into entry points for attackers.
🔍 One compromised help desk session can open doors to sensitive networks and critical data.
📊 Attackers are analyzing workflows and organizational structures to craft highly convincing schemes that evade standard IT protections.
🔥 Proactive simulations and continuous training are key to transforming help desk personnel into a robust human firewall.
👥 AUMINT Trident provides recurring, realistic social engineering simulations that reveal vulnerabilities and deliver actionable insights.
📅 Secure your agency’s frontline now – book a session: https://calendly.com/aumint/aumint-intro
.
#CISO #GovernmentSecurity #CyberSecurity #SocialEngineering #FraudPrevention #HumanFactor #RiskManagement