In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.

Nefilim Ransomware Attack Used “Ghost” Credentials.

According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services. 

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

The Cybersecurity Plot Twists of 2025 – And What They Mean for Your Business

🧠 Deepfakes, Burnout & AI Attacks: 2025’s Shocking Cyber Shifts

🔐 Deepfake impersonation is now targeting CFOs and finance teams – with attackers placing AI-generated voice calls mimicking executives.

📈 AI-powered phishing scaled to 100s of attacks per hour – faster than most companies can respond.

⚠️ Cyber insurance claims are being denied due to missing human-risk controls. Compliance now directly impacts insurability.

🧯 Over-alerting and fear-based training are burning out employees. Security fatigue is now a top talent risk.

What if you could flip the script?

AUMINT Trident delivers recurring, micro-personalized social engineering simulations tailored to each employee’s behavior.

Not once a year. Every month. No more checkbox training.

📌 Want to see how it works? Book a 15-min walkthrough

#CyberSecurity #CISOs #HumanRisk #Infosec #HealthcareSecurity #SecurityAwareness #Deepfake #AIThreats #FinanceLeaders #CyberResilience #AUMINT

read more

Supply Chain Overhaul? Don’t Let Cybersecurity Take a Backseat

🔗 Supply Chain Reinvention Hiding Cybersecurity Risks

🌐 As companies reshuffle supply chains, cyber risks multiply exponentially.

🔍 The more digital and connected your suppliers, the bigger the target hackers see.

⚠️ A single breach can disrupt entire networks and cause multi-million dollar losses.

🤝 But it’s not just technology – human error and social engineering at supplier sites are the silent threats.

🛡️ Most organizations overlook supplier employee awareness – leaving a dangerous gap.

🔑 AUMINT Trident solves this by simulating real-world social engineering attacks across your supply chain ecosystem.

📊 Get real-time risk insights and focus training where it matters most.

Is your supply chain ready to face today’s human cyber risks?

Book your free demo now

#CyberSecurity #SupplyChainSecurity #SocialEngineering #RiskManagement #CISOs #AUMINT #HumanRisk #FraudPrevention #SecurityAwareness

read more

Big Game Hunting: Why Hackers Are Targeting the Titans of Industry

🧨 The $100M Question: Who’s Hunting Your Company?

🔍 Cybercriminals aren’t going wide anymore. They’re going deep.

🎯 Big Game Hunting is the new strategy – and enterprises are in the crosshairs. Hackers are skipping random targets and going after the biggest, richest, and most interconnected players in tech, finance, and retail.

💣 And it’s not just data theft – it’s operational sabotage, supply chain destruction, and executive impersonation on an elite level.

💼 CISOs and Security Leaders: Your biggest risk might not be a firewall misconfig – it could be a vendor with weak email hygiene or an assistant who clicked the wrong file.

👥 Social engineering is the point of entry. Every. Single. Time.

🧠 That’s why human-centric simulation and behavior-based training matter more than ever.

🚨 This isn’t optional anymore – it’s the difference between readiness and ruin.

💡 Want to see how the AUMINT Trident system protects your org from advanced social engineering? Book your free walkthrough today

👇 Read the full breakdown + see how leaders are defending against Big Game Hunting

#CyberSecurity #CISOs #TechLeaders #VendorRisk #SocialEngineering #EnterpriseSecurity #AUMINT #HumanFirewall #RiskManagement #CyberResilience

read more