In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
The Subtle Snail Recruitment Trap – How Attackers Use Fake HR to Steal Credentials and Persist
🚨 Recruitment-Style Phishing Is the New Front Line
😱 Researchers link an Iran-nexus group to recruitment lures that infected 34 devices across 11 organizations, using fake HR profiles to bait targets.
🧩 The bait looks real: tailored outreach, plausible interviews, and job documents that contain weaponized ZIPs or signed binaries which deploy loaders.
🧠 The payload family MINIBIKE steals credentials, logs keystrokes, and creates persistent backdoors for long-term espionage.
⚠️ These campaigns hide traffic in Azure-hosted C2 and abuse DLL sideloading to evade detection, so standard AV often misses them.
✅ Quick actions: treat unsolicited job attachments as untrusted; verify recruiter emails and LinkedIn profiles; sandbox any job-related archive before opening.
🔁 For security teams – simulate recruitment lures, tighten endpoint rules against DLL sideloading, and monitor cloud egress for anomalous C2.
🔎 SEO note: use keywords like job, recruiter, LinkedIn, credential theft, MINIBIKE to surface this threat to practitioners and hiring teams.
🔒 AUMINT.io helps design simulations and detection playbooks that mirror this recruitment workflow. Book a 15-minute intro and get a tailored risk checklist: https://calendly.com/aumint/aumint-intro
#JobSeekers #CISO #HR #ITSecurity #AUMINT #ThreatIntel #RecruitingSecurity
Job Seekers Beware: LinkedIn Scams Are More Sophisticated Than Ever
🚨 Scammers Are Hunting Job Seekers in 2025
The job market is booming, but scammers are evolving faster. 💥 Losses from employment fraud have skyrocketed, hitting thousands per victim.
💡 Amisha Datta thought she got a transcription job on LinkedIn. A check arrived to buy equipment. She wired the money. The check was fake. Her laptop never arrived.
💡 Brenda Smith, a 56-year-old educator, was promised crypto earnings. She deposited funds to unlock her pay. The scammer disappeared. She lost $15,000.
⚡ Scammers now use AI-generated messages and fake websites, making detection incredibly difficult.
✅ Protect yourself: verify recruiters, treat unsolicited offers cautiously, avoid wiring money, and report suspicious activity immediately.
🔒 AUMINT.io offers resources to help job seekers stay safe, spot scams, and secure their careers. Learn how you can protect yourself and your job search with AUMINT.io by scheduling a session here
.
#JobSeekers #CareerSafety #CyberSecurity #FraudPrevention #LinkedInTips #AUMINT #CISO #HR #ITSecurity
Internal Chaos vs. Hackers – Why Your Organization Is More Vulnerable Than You Think
🚨 Internal Chaos Outweighs Hackers in Cyber Incidents
A recent report reveals that internal misalignment during cyber incidents causes more disruption than the attackers themselves. Key findings include:
73% of organizations experience tension between CISOs and CEOs during cyber incidents.
54% report shifts in decision ownership mid-incident, creating uncertainty.
86% suffer delays due to communication breakdowns between teams.
57% encounter major incidents they hadn’t rehearsed.
These insights highlight the critical need for clear communication, defined roles, and coordinated efforts across all departments during a cyber crisis. AUMINT.io offers solutions to address these internal vulnerabilities and enhance organizational readiness.
To learn more about how AUMINT.io can help your organization strengthen its internal processes and improve cybersecurity resilience, schedule an introductory call here
.
#CyberSecurity #IncidentResponse #InternalChaos #AUMINT #CyberResilience #CISO #CEO #CommunicationBreakdown #LeadershipConflicts