In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
Secure File Transfer in 2025 – Protecting Sensitive Data from Modern Threats
🔒 Are Your File Transfers Really Secure in 2025?
🚨 Every file you send could be a gateway for cybercriminals. Hackers are exploiting weak transfer methods to steal sensitive data, inject malware, and manipulate critical documents.
⚡ Traditional email attachments and consumer file-sharing tools are no longer safe. They create vulnerabilities that attackers exploit faster than companies can react.
💡 Compliance requirements in finance, healthcare, and professional services add another layer of urgency. A single mistake can cost millions in fines and reputational damage.
👥 Human behavior is often the weakest link. Employees bypass complex systems, unknowingly leaving doors open for attacks.
✅ At AUMINT.io, we combine secure transfer technology with social engineering simulations, ensuring your teams are trained to recognize risks while your data moves safely.
📈 Don’t wait for an incident to reveal gaps – Book your session now
and see how your organization can protect every file, every transfer.
#CISO #CIO #FraudPrevention #CyberSecurity #RiskManagement #DataProtection
Cybercriminal Alliances in 2025 – Why Collaboration is Their Greatest Weapon
⚔️ Cybercriminals Are Teaming Up – Are Your Defenses Ready?
🚨 In 2025, attackers no longer work alone. They operate in highly organized alliances that share tools, data, and expertise to multiply their impact.
🤯 The most dangerous evolution? Technical hackers and social engineering experts joining forces – using AI phishing to open the door while trained fraudsters exploit human trust inside.
📉 Many companies still think of cyberattacks as isolated incidents. In reality, the threat is now an ecosystem, where multiple criminal groups converge on vulnerabilities simultaneously.
🏢 Mid-market firms and regulated industries face the highest risk. Unlike big enterprises, they rarely have layered defenses and often underestimate how quickly attacks escalate when criminals collaborate.
🔑 The truth is simple – criminals embraced collaboration faster than defenders. If businesses remain reactive, they will always be one step behind.
📈 At AUMINT.io we help organizations fight collaboration with collaboration. Our simulations expose real-world attack tactics and prepare employees to recognize manipulative techniques before they succeed.
👉 Curious how your teams would perform against a coordinated attack? Book your intro session
and see what vulnerabilities could be hiding in plain sight.
#CISO #CIO #CEO #FraudPrevention #CyberSecurity #RiskManagement
RapperBot Resurfaces – The Silent DDoS Army No One Saw Coming
🚨 370,000 Cyberattacks And Counting – The Botnet Wake-Up Call
🔥 A single botnet has launched over 370,000 DDoS attacks worldwide. Most businesses never even notice the danger until systems grind to a halt.
💡 What makes this more alarming? Attackers are no longer using DDoS just to take systems down – they are using it as a distraction while launching fraud, phishing, and data theft campaigns in the background.
⚠️ SMBs and mid-market firms are at the highest risk. Many still think DDoS is “an enterprise problem” while running on outdated security models. RapperBot proves they are wrong.
🧩 The strategy is simple – overwhelm defenses with noise, then slip in through the cracks. Without awareness and preparation, the damage goes beyond downtime into financial loss and reputational collapse.
🔑 The real takeaway: resilience is no longer optional. Attackers evolve, so defenses must evolve faster.
📈 At AUMINT.io we focus on preparing teams to detect the social engineering, fraud, and phishing attacks that often ride on the back of DDoS chaos. Because stopping disruption is just the beginning – real security is about stopping what hides behind it.
👉 Ready to see how AUMINT.io can help your business build awareness cycles that turn blind spots into strengths? Book your session here
.
#CISO #CIO #CEO #COO #CyberSecurity #FraudPrevention #RiskManagement #SMB