In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
Stop Deleting Spam – Turn Your Inbox Into a Cyber Defense Tool
📧 Stop Deleting Spam – Learn From Every Message
Every spam you delete silently teaches attackers.
Marking spam trains filters and helps your team detect advanced threats.
Modern spam hides as bank alerts, invoices, and internal notifications – often overlooked.
Clicking “Unsubscribe” confirms your account is active – a signal attackers track.
AUMINT.io’s Trident simulates complex spam and phishing, trains employees, and turns your inbox into a defense system.
Turn every suspicious email into intelligence. Book your session
now.
#CISO #CTO #CyberSecurity #Phishing #EmailSecurity #SocialEngineering
Why Behaviour Will Decide Your Next Cybersecurity Breach
🎯 Behaviour, Not Tools, Will Trigger Your Next Breach
🧠 Nearly 60 percent of cyber breaches stem from human error, manipulation, or misuse. Technology alone won’t prevent the next incident.
🎭 AI is fueling social engineering – convincing deepfake videos or flawless emails fool even trained employees.
💥 What if your defence could catch risks before they escalate? Human risk analytics does just that – spotting unusual patterns, injecting friction, and nudging users toward safer action.
👥 At AUMINT.io, we don’t just teach – we simulate real-world attacks in flow, track real behaviours, and help teams build instincts to spot deception before damage is done.
👉 Don’t guess how your people will respond under pressure. Book your session now
and build a behaviour-based defence.
#CISO #CIO #CyberSecurity #HumanRisk #SocialEngineering #SecurityOps
CatWatchful Data Leak 2025 – What Every Organization Must Know
🔒 Hidden Data Leaks Could Cost Your Organization Millions
🚨 The CatWatchful 2025 data leak shows that overlooked platforms can expose critical information to cybercriminals.
💡 Attackers exploit low-profile systems and third-party services, turning minor data into major security threats.
👥 Human error remains a top vulnerability – weak passwords, poor authentication, and mismanaged permissions create easy entry points.
✅ AUMINT.io uncovers these hidden risks with simulated social engineering, continuous monitoring, and targeted employee training.
📈 Don’t wait for your organization to be the next headline – Book your session today
and proactively secure your systems.
#CISO #CTO #CIO #CyberSecurity #SocialEngineering #RiskManagement #FraudPrevention