In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.

Nefilim Ransomware Attack Used “Ghost” Credentials.

According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services. 

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

What Scattered Spider’s Airline Breaches Reveal About the Next Wave of Cyberattacks

✈️ Airline Hackers Didn’t Breach Tech – They Breached People

🎯 Scattered Spider’s attacks used no ransomware payload or software exploit. Just human manipulation.

🧠 They tricked employees with urgent fake calls, impersonated IT, and exploited fear and pressure.

🔐 These breaches weren’t due to weak tech – but weak preparedness.

🚨 Annual training doesn’t work. Repetition, simulation, and behavioral reinforcement do.

💡 AUMINT.io helps teams spot social engineering threats before they click or comply.

📊 Real-world simulations, human dashboards, and attack pattern awareness – all in one.

Book your free security simulation demo and stay out of the next breach headline.

#CyberSecurity #SocialEngineering #FraudPrevention #Infosec #CISOs #AviationSecurity #EmployeeTraining #AUMINT #SecurityAwareness

read more

⚠️ Don’t Let a Junior Employee Become Your Weakest Link

It happens all the time:
• Personal email reused on a company system
• Slack links indexed on public search
• Docs uploaded with no expiration

One innocent move can open your whole attack surface.

The AUMINT Report finds this stuff before threat actors do – and helps you fix it before it costs you.

€1,500 to remove massive blind spots.

🛡 Book your scan today: https://calendly.com/aumint/aumint-intro

#HumanRisk #CyberSecurity #InfoSec #DigitalHygiene #SOC #CISO #AUMINT

read more

How SMBs Can Turn Rising Ransomware and Social Engineering Threats Into Resilience

🔐 SMBs Face Rising Ransomware and Social Engineering Threats

📈 Cyberattacks targeting SMBs have surged, exposing resource gaps and vulnerabilities.

🧩 Ransomware locks down critical data; social engineering exploits human trust.

⚠️ SMBs must shift from reactive to proactive security strategies focusing on people.

🧠 AUMINT Trident offers adaptive social engineering simulations tailored for your team’s roles, helping reduce risk before attacks happen.

🔥 Don’t wait for a breach – empower your employees as your strongest defense.

Protect your SMB with AUMINT today

#CyberSecurity #SMB #Ransomware #SocialEngineering #HumanFirewall #AUMINT #CISO #SecurityAwareness

read more