In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.

Nefilim Ransomware Attack Used “Ghost” Credentials.

According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services. 

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

Corporate Social Media Accounts – Hidden Risks You Can’t Ignore

🚨 Corporate Social Media – Your Hidden Security Threat

Marketing teams often control accounts, not IT.

💡 Shared credentials and disabled MFA leave dormant accounts open to attacks.

⚡ Attackers can post offensive messages, redirect ad spend, or distribute malware.

👥 MFA bottlenecks and social engineering create human factor vulnerabilities.

✅ IAM/IGA tools like Cerby centralize access, enforce MFA, and rotate passwords.

✅ Continuous monitoring prevents ghost accounts and unauthorized posts.

AUMINT.io simulates attacks and uncovers hidden risks before damage occurs – Book your session now
.

#CyberSecurity #SocialMediaSecurity #FraudPrevention #BrandProtection #CISO #ITSecurity

read more

The Neighbor Attack – A New Cyber Threat You Didn’t See Coming

🔐 Neighbor Attack – Your Office Wi-Fi Could Be the Weak Link

🚨 A new cyber threat has emerged, exploiting the proximity of neighboring offices to infiltrate secure networks.

🕵️‍♂️ Attackers gain access to a neighboring office’s network, bridging the gap to your organization’s Wi-Fi, bypassing MFA protections.

💡 This highlights a critical oversight in traditional cybersecurity measures – assuming physical proximity doesn’t equate to network vulnerability.

🔒 Implementing strict network segmentation and continuous monitoring are essential defenses against such threats.

📊 AUMINT.io provides real-time threat detection and comprehensive security analytics to protect your organization from emerging cyber threats.

🚀 Stay ahead of cybercriminals – Schedule your demo

#CyberSecurity #NetworkSecurity #MFA #WiFiSecurity #AUMINT

read more

Managers Doubt Employees’ Cyber Awareness – Here’s Why It Matters

🔐 Managers Doubt Employees’ Cyber Awareness – Here’s Why It Matters

🚨 A recent survey reveals that 80% of managers believe their employees lack basic cybersecurity awareness.

🤖 44% of managers fear their employees won’t recognize AI-driven attacks, highlighting the increasing sophistication of cyber threats.

📉 Despite acknowledging the importance of cybersecurity training, only 48% of managers are implementing regular programs.

🌍 In Israel, only 54% of employees view cybersecurity training positively, compared to 86% globally.

🔒 At AUMINT.io, we offer tailored training programs that simulate real-world attacks, helping employees recognize and respond to threats effectively.

🚀 Enhance your organization’s cybersecurity posture – Schedule your demo

#CyberSecurity #EmployeeAwareness #AIThreats #AUMINT

read more