In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
Phishing Attacks Engineered to Outsmart Your Secure Email Gateway
⚠️ Phishing Emails That Outsmart Your Security Systems
Phishing attacks aren’t random anymore – they’re carefully engineered to bypass secure email gateways.
🔍 Attackers manipulate headers, hide payloads, and mimic trusted contacts to evade detection.
🧠 These emails exploit human psychology – urgency, authority, and curiosity – to trick even vigilant users.
❗ Technology alone can’t stop these advanced threats; the human factor remains the weakest link.
🛡️ AUMINT Trident simulates the latest phishing tactics and pinpoints workforce vulnerabilities in real time.
Ready to stop phishing attacks before they start?
Book a free demo now
#CyberSecurity #PhishingPrevention #SocialEngineering #HumanRisk #AUMINT #CISO #SecurityAwareness
Ransomware’s New Era: Why Smart CISOs Are Rewriting Their Budgets in 2025
🧠 Ransomware Budgets Are Up – But Are You Spending Smart?
💣 CISOs are increasing ransomware budgets – but here’s the twist:
Most of that money still goes toward old-school defenses that attackers already know how to bypass.
🔍 Meanwhile, cybercriminals are skipping firewalls and going straight for your team – using AI-powered social engineering, deepfake calls, and vendor impersonation to walk into your network.
🧩 The real question in 2025 isn’t how much you’re spending – it’s what you’re investing in.
📊 Smart orgs are focusing budgets on human-layer defense:
Continuous phishing simulations
Real-time employee risk dashboards
Personalized training based on attack patterns
💡 Because ransomware doesn’t breach your tech – it breaches your people.
🚀 That’s where AUMINT Trident comes in.
Our platform gives CISOs live insight into human attack surfaces – and how to lock them down before real attackers find them.
🔗 Book a free AUMINT intro call – and see how fast you can upgrade your ransomware resilience.
#CyberSecurity #CISOs #Infosec #FraudPrevention #HumanRisk #SocialEngineering #SecurityAwareness #AUMINT #Trident #ITSecurity #SOC #Ransomware #BudgetStrategy
Deepfakes, Fake Recruiters, and Cloned CFOs: The New Face of Social Engineering Attacks
🎭 Deepfakes and Fake Recruiters Are Rewriting Cybercrime Playbooks
💡 The most dangerous attacks today aren’t technical glitches but psychological manipulation through AI-driven deepfakes and cloned voices.
🔊 Imagine your CFO’s voice instructing a wire transfer – but it’s a synthetic clone.
🎯 Fake recruiters target job seekers to harvest data or spread malware with alarming realism.
🚨 These tactics bypass firewalls by exploiting human trust and authority.
🔍 How prepared is your workforce against these next-gen social engineering threats?
🛡️ AUMINT Trident simulates these cutting-edge attacks, delivering critical risk insights and tailored training.
Don’t let your defenses be fooled by fake faces.
Secure your demo today
#CyberSecurity #SocialEngineering #Deepfakes #FraudPrevention #CISOs #AUMINT #HumanRisk #VoiceCloning