In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.

Nefilim Ransomware Attack Used “Ghost” Credentials.

According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services. 

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

Why Employee Logins Are Today’s Most Valuable Cyber Currency

🔐 Employee Logins Are Hackers’ Most Valuable Target

🚨 Hackers aren’t just after customer data anymore – your employees’ login credentials are now the key to entire corporate networks.

💡 Once attackers have access, they move silently, escalating privileges and stealing sensitive info without raising alarms.

🧠 Most security tools don’t stop social engineering and phishing that trick employees into handing over credentials.

🎯 AUMINT’s real-world simulations train your teams to spot and stop these attacks before damage is done.

⏳ The question isn’t if your logins will be targeted, but when. Are your people ready?

Secure your workforce with AUMINT and turn your employees into your strongest defense.

#CyberSecurity #SocialEngineering #Phishing #CISO #SecurityAwareness #AUMINT

read more

Why Mobile Phishing Is Your Team’s Biggest Blind Spot

📱 Over Half Still Fall for Mobile Phishing

🚨 51% of employees still click on phishing links delivered via mobile.

📲 These aren’t spammy emails – they’re believable SMS, fake MFA prompts, spoofed login pages, and QR lures.

🔓 All it takes is one tap to expose the entire organization.

🔍 Mobile phishing often bypasses traditional email filters and goes undetected by security teams.

💡 At AUMINT.io, we simulate exactly how modern attackers target mobile users – then show you which employees take the bait.

📉 Within weeks, we help companies cut mobile-click risk in half – and reduce the chance of business compromise where it’s rising fastest.

📈 Your security isn’t complete if it doesn’t cover phones.

🎯 Let’s simulate a real-world mobile attack on your org and show you where your exposure lies.

Book your AUMINT.io session now

#CyberAwareness #MobilePhishing #HumanRisk #SecurityTraining #CISOTips #FraudPrevention #SMBSecurity #AUMINT

read more

When Your Brand Becomes the Weapon – The Rise of Impersonation Scams

🎭 Hackers Are Now Weaponizing Trusted Brands

📉 Brand impersonation scams are exploding – and they’re not sloppy. These emails and texts look like your bank, your vendor, your CEO.

🔒 Trust has become the easiest entry point for attackers. And once they have it, the click is just a formality.

🧠 It’s not enough to warn teams. They must experience real impersonation attempts to build reflexive resistance.

🚨 AUMINT.io builds real-world brand spoofing simulations to retrain instincts – before real damage hits.

📈 These scams are scaling fast because attackers know something most orgs ignore – we don’t suspect what we recognize.

📲 Want your team to confidently spot fakes, not freeze? Book a 1:1 AUMINT demo

#CyberSecurity #SocialEngineering #BrandImpersonation #CISO #SecurityAwareness #AUMINT

read more