In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.

Nefilim Ransomware Attack Used “Ghost” Credentials.

According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services. 

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

Executives and Celebrities Are Prime Targets for Social Engineering Attacks

🚨 Executives and Celebrities Under Targeted Attacks

💡 Hackers are exploiting public data and social media to craft highly convincing schemes.

⚠️ Personalized social engineering attacks manipulate psychology – urgency, flattery, or fear – to bypass standard security.

📊 Even top-tier executives with robust IT defenses are vulnerable because human behavior remains the weak link.

🔍 Every interaction, post, or appearance can be mined to create targeted attacks that compromise individuals and organizations alike.

🔥 Mitigation requires proactive social engineering simulations and continuous employee training.

👥 AUMINT Trident simulates real-world attacks, tracks responses, and strengthens your human firewall before breaches happen.

📅 Protect your leadership and teams now – book a session: https://calendly.com/aumint/aumint-intro
.

#CISO #ExecutiveProtection #CyberSecurity #SocialEngineering #FraudPrevention #HumanFactor #RiskManagement #LeadershipSecurity

read more

☁️🔍 Free Cloud Misconfiguration Scanners You’ll Wish You Tried Earlier ☁️🔍

Cloud misconfigurations remain the #1 cause of breaches in 2025 – and the worst part is, most could have been avoided with the right tools. Here are some free scanners that every CISO should have in their arsenal:

1️⃣ ScoutSuite – Multi-cloud security auditing tool by NCC Group.
🔗 https://github.com/nccgroup/ScoutSuite

2️⃣ Prowler – AWS, Azure, and GCP security best practices scanner.
🔗 https://github.com/prowler-cloud/prowler

3️⃣ CloudSploit by Aqua – Continuous configuration monitoring for major cloud providers.
🔗 https://github.com/aquasecurity/cloudsploit

4️⃣ Checkov – Policy-as-code scanner for IaC (Terraform, Kubernetes, CloudFormation).
🔗 https://github.com/bridgecrewio/checkov

5️⃣ Cloud Custodian – Rules engine for governance and compliance enforcement.
🔗 https://github.com/cloud-custodian/cloud-custodian

⚡These tools highlight risky IAM roles, exposed buckets, insecure defaults, and weak policies – the same gaps attackers exploit.

At AUMINT.io, we look at the other side of the coin – simulating how attackers exploit the human misconfigurations through phishing, vishing, and social engineering. Because even a perfectly hardened cloud is vulnerable if an employee gives access away.

🔗 Curious how exposed your human layer really is? Book a free demo

#CloudSecurity #CISO #CyberSecurity #ThreatIntelligence #AUMINT

read more

PipeMagic Malware Exposes How Easily Critical Systems Can Be Hijacked

🚨 PipeMagic Malware Threatens Critical Industrial Systems

💡 PipeMagic targets pipeline management systems, manipulating valves, monitoring operations, and hiding in plain sight.

⚠️ What makes it dangerous? It combines technological exploits with human errors, bypassing traditional IT defenses to compromise industrial operations.

📊 Most organizations focus on IT security while leaving operational technology exposed. Attackers know OT networks are the true leverage points.

🔍 Employee actions are just as critical – executing one malicious command can give attackers full operational control.

🔥 Mitigation requires a dual approach: strengthen OT defenses and train employees to spot sophisticated attacks through recurring, realistic simulations.

👥 AUMINT Trident provides these simulations, tracking vulnerabilities and turning employees into active defenders before attacks succeed.

📅 Protect both your workforce and industrial systems now – book a session here: https://calendly.com/aumint/aumint-intro
.

#CISO #IndustrialSecurity #CyberSecurity #OperationalTechnology #FraudPrevention #HumanFactor #RiskManagement #CriticalInfrastructure

read more