In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.

Nefilim Ransomware Attack Used “Ghost” Credentials.

According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services. 

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

When Everyday Tools Become Cyberattack Vectors: How Threat Actors Exploit ChatGPT, Cisco AnyConnect, Google Meet, and Teams

⚠️ Cybercriminals Exploit ChatGPT, Cisco AnyConnect, Google Meet, Teams

🚨 Trusted collaboration tools are now targets for highly sophisticated social engineering attacks.

🔍 Threat actors craft personalized phishing, exploit VPN flaws, and send fake meeting invites to steal credentials and spread malware.

🧠 These attacks blend technology and psychology, making detection by automated defenses tough.

💡 Human vigilance is crucial – technology alone won’t stop these evolving threats.

🔥 AUMINT Trident delivers tailored social engineering simulations to turn employees into your strongest defense.

Strengthen your human firewall with AUMINT

#CyberSecurity #SocialEngineering #AUMINT #Phishing #CISO #SecurityAwareness #TechSecurity

read more

🚨 87% of Breaches Could’ve Been Prevented with One Thing: Visibility

Not more tools. Not more alerts. Just real visibility into what’s publicly exposed.

The average org has dozens of digital risks it doesn’t know about:
• Legacy login portals still online
• Team members reusing passwords
• Cloud assets forgotten after migration

AUMINT’s €1,500 Attack Surface Report shows you what’s already out there – and how to shut it down fast.

🧭 Don’t get caught off guard. Get ahead.

📅 Book a scan: https://calendly.com/aumint/aumint-intro

#CyberSecurity #DigitalRisk #CISO #AttackSurface #AUMINT #SOC

read more

Real Estate Deals Are Under Attack – The Hidden Weak Link

🏚️ Real Estate Is a Cybercrime Dream – Here’s Why

💸 Large wire transfers.
📂 Sensitive docs shared by email.
⛓️ Dozens of third-party vendors.

That’s a perfect playground for attackers.

📧 One spoofed message can redirect funds, collapse deals, and destroy trust.

🔍 Most firms don’t have real cybersecurity standards – and attackers know it.

📉 Real estate’s weak IT backbone is now the #1 risk to deal integrity.

⚙️ AUMINT Trident gives firms real-time employee simulations and phishing defense at the human layer.

🧠 Train teams before they fall for attacks.

🔒 If your business moves fast, your protection has to be faster.

Book your free AUMINT strategy session today

#RealEstate #CyberSecurity #FraudPrevention #WireFraud #CISOs #HumanRisk #AUMINT #CyberAwareness #SecurityTraining

read more