In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.

Nefilim Ransomware Attack Used “Ghost” Credentials.

According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services. 

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

Essential Cybersecurity Practices for Remote Work That Protect Your Business and People

🔐 Remote Work Demands Smarter Cybersecurity Now

🏠 Working from home creates new attack surfaces with unsecured networks and devices.

🎯 Phishing and social engineering threats are on the rise, exploiting human vulnerabilities beyond office walls.

💡 Policies matter, but real-world simulations turn training into instinctive defense for remote teams.

🚀 AUMINT.io delivers tailored, ongoing social engineering simulations designed to build lasting resilience.

📊 Track, train, and transform your workforce’s security posture with actionable insights.

Discover how AUMINT protects remote workers

#RemoteWork #CyberSecurity #SocialEngineering #FraudPrevention #AUMINT #InformationSecurity #EmployeeTraining

read more

Healthcare’s Cyber Crisis Demands a New Approach to Social Engineering Defense

⚠️ Healthcare’s Cyber Crisis Targets Human Vulnerabilities

🔍 Social engineering is the top weapon cybercriminals use to breach healthcare systems by manipulating overwhelmed staff.

💔 Patient data and care delivery are at risk as attackers exploit trust, urgency, and distraction in hospitals and clinics.

🚨 Many providers are unprepared for the sophistication and scale of these attacks, leading to costly breaches and reputational damage.

🎯 AUMINT.io offers tailored, recurring simulations that train healthcare teams to spot and stop social engineering before harm occurs.

🛡️ Turn your staff into active defenders with real-world practice and actionable insights.

Discover how AUMINT strengthens healthcare defenses

#HealthcareSecurity #SocialEngineering #CyberSecurity #FraudPrevention #AUMINT #HealthTech #RiskManagement

read more

North Korean Hackers Exploit Job Search to Breach Developers

🎯 North Korean Hackers Target Developers with Fake Jobs

🔍 Cybercriminals are posing as recruiters, sending personalized job offers to developers.

🛑 The goal? Deliver malware disguised as recruitment materials and breach critical systems.

💡 Why does this work? Developers are eager for opportunities, making the human layer vulnerable.

🧠 AUMINT Trident trains your team to spot these deceptive tactics with role-specific simulations and ongoing awareness cycles.

⚠️ Intellectual property theft and data leaks are just the start of the fallout.

Don’t wait for a breach to act.

Protect your team now with AUMINT

#CyberSecurity #SocialEngineering #Developers #HumanFirewall #AUMINT #CISO #RecruitmentSecurity

read more