In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
Professional Services Under Fire – Cybercriminals’ New Favorite Target
🚨 Professional Services Are in Cyber Focus
📊 Law, accounting, consulting firms handle privileged info that attackers want.
⚠️ Supply-chain vulnerabilities and third-party vendors create hidden risk ladders.
📧 Phishing, invoice fraud, business email compromise are frequent tactics.
🎯 Firms with fragmented governance and outdated tools suffer bigger consequences.
🔐 Clear detection, strong vendor control, and visibility over data flows matter most.
✅ AUMINT.io simulates risk, audits vendors, and builds resilience for firms under siege.
📅 Don’t risk client trust – Book a session with AUMINT.io
to assess your exposure now.
#CISO #CIO #CTO #ProfessionalServices #CyberSecurity #VendorRisk #DataProtection #AUMINT
5 Executive Mistakes in Cyber Incidents – What Leadership Overlooks
📊 5 Mistakes Executives Make During Cyber Incidents
🚨 Many leaders act on partial or outdated data, making critical decisions blind.
⚙️ Focusing purely on technical fixes without business, legal, or reputational context limits effectiveness.
🗣️ Silent communication – internal or external – causes loss of trust and growing uncertainty.
📄 Policy documents that don’t reflect reality get ignored when crisis hits.
💡 Creative ideas are good, but untested ones fail when infrastructure doesn’t support them.
📈 Leadership needs scenario drills, communication rehearsals, and documented continuity plans.
✅ AUMINT.io helps you simulate executive decision-making, audit your policies, and build frameworks that work under pressure.
📅 Not ready? Book your session with AUMINT.io
and avoid repeating these mistakes.
#CISO #CIO #CTO #Leadership #CyberIncident #RiskManagement #ExecutiveSecurity #AUMINT
Hackers Target Universities – Not Just For Money
🎓 Universities Are High-Impact Targets – Not Just For Money
🚨 Attackers deface pages and leak records to expose perceived policy violations or to protest actions.
🔍 Academic networks hold sensitive research, personal data, and fragmented systems that invite exploitation by attackers.
⚠️ Ideological groups sometimes use breaches to make public statements and pressure institutional leaders.
💥 Some attacks include multi-year data dumps, causing reputational damage and regulatory exposure for schools.
📈 Attempts against higher education infrastructure have risen sharply, showing a global and persistent trend.
🛡️ Defenders must prioritize unified governance, visibility, and rapid incident response across all departments.
🔐 Implement identity hygiene, segmentation, and rapid patching to reduce attack surface and lateral movement risk.
🧪 Run red team simulations and tabletop exercises to test readiness and public communication plans effectively.
🔎 Monitor for spikes in submissions, unusual access patterns, and cross-departmental anomalies in logs to detect intrusions early.
🤝 Coordinate with legal, PR, and academic leadership to prepare rapid, transparent responses that limit fallout.
📅 Protect your campus now – Book a session with AUMINT.io
#CISO #CIO #CTO #HigherEd #CyberSecurity #DataProtection #AUMINT