In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
New Phishing Attack Uses DWP Impersonation to Steal Credit Card Data – How to Protect Yourself and Your Organization
⚠️ New Phishing Scam Targets Users by Posing as DWP
A fresh wave of phishing attacks is tricking victims with highly convincing messages pretending to be from the UK’s Department for Work and Pensions.
🚨 The scam aims to steal credit card details by exploiting trust in official institutions and using professional branding to appear legitimate.
🔍 Recognizing urgent requests for financial data and suspicious links is vital but challenging due to the scam’s sophistication.
🛡️ Traditional filters aren’t enough; ongoing, realistic social engineering training is critical to keep your defenses strong.
AUMINT Trident simulates real phishing attacks tailored to your business, preparing employees to spot and stop fraud in its tracks.
Stay ahead of evolving threats before they hit your organization.
Schedule your AUMINT demo today
#Phishing #CyberSecurity #SocialEngineering #FraudPrevention #AUMINT #SecurityAwareness #CISO
Japan’s Cyber Crisis: What Global Enterprises Must Learn From These Targeted Attacks
🧠 Japan’s Cyber Attacks Are a Warning Shot
📌 Over 80% of attacks on Japanese firms in 2024 were targeted – not random.
🎯 Cybercriminals are studying org charts, mimicking voices, cloning emails – and going after the humans in your company, not just the tech.
🔍 One firm was infiltrated through deepfaked Zoom calls + spoofed executive emails. Result? Millions lost in just days.
🔥 Why Japan? Because high-trust business cultures are ripe for social engineering.
That includes YOU – if you’re in EU, UK, or US markets.
📉 This isn’t just a Japan problem. These tactics are already crossing continents – and they work.
🔐 AUMINT.io helps security leaders stay ahead with real-world simulations, tailored training, and human-layer threat detection.
💥 Ready to know if your org would fall for one of these?
Book a quick intro call here
#CISOs #CTOs #CyberSecurity #ExecutiveProtection #SocialEngineering #Infosec #SecurityAwareness #FraudPrevention
When Corporate Compliance Fails: The Hidden Risks of Retaining Benefits from Criminal Conduct
🚨 Corporate Compliance Alert: Retaining Criminal Gains Risks Everything
A company and its director in Singapore were charged for holding benefits tied to criminal conduct, highlighting a growing risk few organizations fully grasp.
⚠️ Fraudsters blend illicit gains into everyday business, making detection tough without ongoing vigilance.
🔍 The threat is not just external – insiders can unintentionally or knowingly facilitate these risks.
🧠 Behavioral analytics and social engineering training are critical tools to identify and mitigate these hidden dangers.
🛡️ AUMINT Trident simulates realistic attack scenarios and tracks workforce vulnerabilities in real time, giving you a proactive defense.
Protect your company’s integrity before risk turns into costly consequences.
Schedule your AUMINT demo today
#CorporateCompliance #InsiderThreats #SocialEngineering #FraudPrevention #AUMINT #RiskManagement #CISO