In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.

Nefilim Ransomware Attack Used “Ghost” Credentials.

According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services. 

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

🛠️ Problem: Unknown Exposures. Solution: AUMINT Report

Many orgs struggle with knowing what’s exposed outside their walls.

Traditional tools don’t help with this blind spot.

The €1,500 Attack Surface Report gives you a clear map.

Fix blind spots before they become breaches.

📍 Schedule your scan: https://calendly.com/aumint/aumint-intro

#CyberSolutions #AttackSurface #DigitalRisk #InfoSec #AUMINT

read more

How Fake CAPTCHAs Became One of the Most Dangerous Entry Points in Cybercrime

🛑 The CAPTCHA You Clicked Might Be Malware

🧠 Cybercriminals have weaponized fake CAPTCHAs to deploy malware – and they’re working.

💥 Users are tricked into thinking they’re verifying identity, when in reality, they’re clicking “download malware.”

⚠️ These attacks are stealthy, visual, and play on trust.

🧪 AUMINT.io now includes simulated fake CAPTCHA attack training modules – testing if employees can spot and stop visual social engineering before it’s too late.

📉 These aren’t basic phishing attempts. They’re experience-based deceptions that bypass traditional filters and rely on one thing – human error.

🔐 If your team isn’t trained to spot trust-based visual traps, you’re already exposed.

👀 Want to see how your employees perform against fake CAPTCHA attacks?

Book a simulation demo today

#Cybersecurity #SocialEngineering #CISO #SecurityAwareness #Phishing #FraudPrevention #AUMINT #HumanRisk

read more

Employee Credentials Are the New Prime Target for Hackers

🔐 Employee Credentials Are Hackers’ Favorite Target

🚨 Hackers have turned their sights on employee login credentials to silently access and exploit corporate networks.

🧩 These credentials bypass many traditional defenses, making social engineering and phishing attacks incredibly effective.

🛠️ Technology can’t stop what human vulnerability allows – that’s why employee training is the game changer.

🎯 AUMINT’s tailored simulations immerse your workforce in real-world attack scenarios, boosting awareness and reducing risk.

⏳ Waiting for a breach to act is costly – is your team ready to defend your most critical access points?

Empower your workforce with AUMINT and turn vulnerabilities into strengths.

#CyberSecurity #SocialEngineering #Phishing #CISO #SecurityAwareness #AUMINT

read more