In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
The 94% Malware Surge No One Is Talking About – Until It’s Too Late
💣 Malware Spiked 94% – Here’s What That Really Means
📈 Q4 2024 saw malware skyrocket – up 94%
📊 But the delivery method? Often social engineering – not brute force
👀 Malware is now hidden in fake IT requests, spoofed logins, even helpful-looking updates
😬 Employees are clicking… not because they’re careless – but because attackers are that convincing
🧠 This is a people issue, not just a tech one
🔐 AUMINT.io’s Trident simulates real-world malware delivery tactics
🎯 Then we train teams to recognize the traps before it’s too late
🛡️ Don’t just measure awareness – build real behavioral resilience
👉 Book a call to protect your people now
#MalwareSurge #HumanRisk #SocialEngineering #CyberAwareness #CISOInsights #PhishingDefense #SecurityCulture #HumanFirewall #CyberTraining #SecurityAwareness
🔐 Operational Technology Isn’t “IT’s Problem” Anymore
🧠 Operational Technology breaches begin in IT – but they end with physical disruption.
🏭 Power loss. Water tampering. Equipment malfunction.
📉 The line between cyber and physical is gone.
⚠️ That makes Operational Technology security a national safety issue – and a board imperative.
🛡️ AUMINT.io equips boardrooms with Operational Technology breach simulations and remediation roadmaps.
📆 See how it works: https://calendly.com/aumint/aumint-intro
💬 What cyber-physical convergence risks are you watching in 2025? 👇
🔎 #CyberPhysical #Operational TechnologySecurity #BoardLeadership #AUMINT
SMS: The Trojan Horse in Your Pocket Exploiting Human Weakness
📱 This Is the New Phishing Frontier You’re Ignoring
🚨 SMS-based social engineering is rising – and it works
⚠️ It’s not just spam – it’s weaponized trust in real-time
🎭 Attackers impersonate CEOs and colleagues in urgent, emotional texts
🤯 No firewall or AI tool can block a person tricked into believing a lie
📉 The risk? One message = one mistake = one breach
🔍 AUMINT.io simulates these real threats to prepare your team the right way
📊 With Trident, we recreate smishing attacks and analyze how your people respond
📈 Then we turn insights into targeted awareness that hardens your human layer
💥 Want to see how your team would handle a CEO text trap?
👉 Book your strategy call now
#Smishing #SocialEngineering #HumanRisk #PhishingAwareness #CyberTraining #CISOInsights #SecurityAwareness #SecurityCulture #InfoSecLeadership #CyberResilience