In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.

Nefilim Ransomware Attack Used “Ghost” Credentials.

According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services. 

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

CatWatchful Data Leak 2025 – What Every Organization Must Know

🔒 Hidden Data Leaks Could Cost Your Organization Millions

🚨 The CatWatchful 2025 data leak shows that overlooked platforms can expose critical information to cybercriminals.

💡 Attackers exploit low-profile systems and third-party services, turning minor data into major security threats.

👥 Human error remains a top vulnerability – weak passwords, poor authentication, and mismanaged permissions create easy entry points.

✅ AUMINT.io uncovers these hidden risks with simulated social engineering, continuous monitoring, and targeted employee training.

📈 Don’t wait for your organization to be the next headline – Book your session today
and proactively secure your systems.

#CISO #CTO #CIO #CyberSecurity #SocialEngineering #RiskManagement #FraudPrevention

read more

Cognizant Password Reset Incident – Lessons in Cybersecurity Vigilance

⚠️ Password Resets Can Make or Break Your Security

🚨 The Clorox-Cognizant incident shows how overlooked password reset procedures can open doors for attackers.

💡 Even trusted IT partners can create vulnerabilities if protocols aren’t strictly followed.

👥 Human error magnifies risk – employees and contractors following flawed procedures can unintentionally expose critical systems.

✅ AUMINT.io helps organizations detect and remediate hidden vulnerabilities through simulated attacks, behavioral monitoring, and continuous oversight.

📈 Don’t wait for legal or reputational fallout – Book your session now
and fortify your defenses before gaps are exploited.

#CISO #CTO #CIO #CyberSecurity #FraudPrevention #RiskManagement

read more

SharePoint Zero-Day Exploit 2025 – How Organizations Can Stay Ahead

⚠️ SharePoint Zero-Day Threats Are Real in 2025

🚨 A newly discovered zero-day in Microsoft SharePoint allows hackers to access sensitive corporate data and manipulate documents silently.

💡 Traditional reactive security isn’t enough. Waiting for patches leaves critical systems exposed to attackers who move faster than most IT teams.

👥 Human behavior magnifies risk – employees interacting with compromised files can unintentionally open doors for cybercriminals.

✅ AUMINT.io helps organizations combine automated monitoring, simulated attacks, and employee training to anticipate threats before damage occurs.

📈 Don’t wait for breaches to expose vulnerabilities – Book your session now
and secure your collaboration platforms today.

#CISO #CIO #CTO #FraudPrevention #CyberSecurity #DataProtection

read more