In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.

Nefilim Ransomware Attack Used “Ghost” Credentials.

According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services. 

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

The Poisoned QR Code: How MFA Became a Weapon

🔐 MFA Is Now the Entry Point – Not the Barrier

🚨 Cybercriminals are now embedding poisoned QR codes into fake login portals and phishing emails.

🧠 They’ve figured out that if they can’t bypass MFA – they’ll make you bypass it for them.

📱 A new wave of attacks targets users scanning what look like legit QR codes to verify logins. But the second they scan – the session is hijacked, and the attacker is in.

🎯 What’s scary? Most security programs don’t even simulate this attack vector.

🔍 This is a massive blind spot. And cybercriminals know it.

🛡️ Forward-leaning CISOs are now pressure-testing MFA workflows using advanced simulations – especially QR-based authentication flows.

💡 AUMINT Trident was built for this moment. We simulate poisoned QR code attacks, track weak spots by department, and deliver customized defenses across your org.

📊 Want to see how your org would respond to a poisoned QR code attack?

👉 Book a walkthrough of AUMINT Trident

#CyberSecurity #CISO #MFA #SocialEngineering #ZeroTrust #SecurityAwareness #QRcodeAttack #EnterpriseSecurity #FraudPrevention #SecurityLeadership #ITOps

read more

96% of Financial Firms Aren’t Ready for DORA – Here’s How to Catch Up Fast

🔒 96% of Financial Firms Not DORA-Ready

📊 96% of financial entities across EMEA admit they’re not prepared for DORA.

⏰ That’s not a minor delay – it’s a systemic gap in operational resilience.

🧠 Most are still clinging to outdated compliance playbooks, relying on static controls and annual training. But DORA demands live visibility, third-party awareness, and adaptive employee response strategies.

💡 The most shocking part?
Less than 10% have real-time insight into their digital risk posture – and the rest are exposed.

📉 These organizations are sleepwalking toward regulatory breaches and reputational fallout.

🔍 AUMINT Trident was built for this moment. It runs persistent real-world simulations, detects soft spots in employee awareness, and builds a human-first risk dashboard tailored for compliance leaders.

📈 DORA compliance isn’t about ticking boxes. It’s about proving your operational resilience under fire.

📅 If your board can’t confidently say “We’re ready,” it’s time for a serious pivot.
Book a free 20-min DORA-readiness strategy call now

#CyberSecurity #DORA #OperationalResilience #CISO #Finance #RegTech #Compliance #RiskManagement #AUMINT

read more

💬 Darknet Forums That Fuel Social Engineering Threats You Must Track 💬

Cyber attackers thrive where conversations are hidden. These forums are the breeding grounds for new phishing kits, ransomware deals, and insider threat exchanges.
⚠️ Ignoring these spaces means missing early warning signs of major attacks.

Here are critical darknet forums your team should monitor:

🔍 16Chan – http://mbv5a7cc6756lkpqts6si5zcpxwvd43cyb4atbqzjqypktsdoftphyqd.onion/
🔍 8chan.moe – http://4usoivrpy52lmc4mgn2h34cmfiltslesthr56yttv2pxudd3dapqciyd.onion
🌍 8kun (Clear Web) – https://8kun.top/index.html
🔍 9chan – http://ninechnjd5aaxfbcsszlbr4inp7qjsficep4hiffh4jbzovpt2ok3cad.onion/
🔍 Anon Cafe – http://tew7tfz7dvv4tsom45z2wseql7kwfxnc77btftzssaskdw22oa5ckbqd.onion
🔍 Dread – http://dreadytofatroptsdj6io7l3xptbet6onoyno2yv7jicoxknyazubrad.onion/
🔍 Hidden Answers – http://q7fn5gvufkvqmg2p7hxdihbkfutgftv6pu5dors4t3r7sec6tcmewhid.onion/
🔍 Hidden Reviews – http://u5lyidiw4lpkonoctpqzxgyk6xop7w7w3oho4dzzsi272rwnjhyx7ayd.onion
🔍 Ramble – http://rambleeeqrhty6s5jgefdfdtc6tfgg4jj6svr4jpgk4wjtg3qshwbaad.onion/
🔍 Suprbay – http://suprbaydvdcaynfo4dgdzgxb4zuso7rftlil5yg5kqjefnw4wq4ulcad.onion/

Monitoring these forums gives you insider visibility into attack planning and new fraud schemes.
🔐 At AUMINT.io, we turn this threat intel into actionable training simulations for your team.

📞 Want to stay ahead of the next big social engineering wave? Let’s connect.

#ThreatIntel #Darknet #SocialEngineering #CyberSecurity #FraudPrevention #AUMINTio #CISO #SecurityOps #DFIR

read more