In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.

Nefilim Ransomware Attack Used “Ghost” Credentials.

According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services. 

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

Social Engineering: The Invisible Threat at Your Front Door

🧠 Are You Training Your People to Doubt Insiders?

⚠️ Social engineering attacks exploit trust, urgency, fear, and curiosity to break in without code.

📞 Vishing, smishing, pretexting – they all manipulate emotions, not systems.

📉 Most security plans ignore psychological tactics. But that’s what hackers rely on.

🎯 AUMINT.io simulates real-world scenarios across email, voice, and SMS – mimicking modern campaigns.

🤝 We guide employees to pause, question, and verify requests – even from IT or leadership.

✅ Build mental muscle, not just tech controls.

Transform your human firewall today

#CyberSecurity #SocialEngineering #SecurityAwareness #HumanRisk #CISO #ThreatIntelligence #AUMINT #FraudPrevention #ExecutiveTraining

read more

Unlock Real Mobile Threat Protection Before It’s Too Late

📱 Is Your Mobile Security Actually Leaving You Exposed?

⚠️ Legacy tools like antivirus and MDM miss stealthy mobile threats – from rogue apps to voice phishing.

🔍 Shadow installs and encrypted C2 hide attacks in plain sight.

🎯 Real‑time behavioral analytics are no longer optional.

🛡️ AUMINT.io’s MTM delivers live detection of risky Wi‑Fi, suspicious apps and on‑device AI anomalies.

🚨 Plus, we offer step‑by‑step mobile incident response designed for first responders.

📈 Your mobile devices power mission‑critical communication – your defense must match that.

👉 Ready for a mobile security upgrade?
Book your Mobile Threat Assessment

#MobileSecurity #ThreatManagement #EnterpriseSecurity #AUMINT #MTM #CyberAwareness #CISO #MobileDefense

read more

🔐 Cyber Insurance Doesn’t Cover Ignorance

Insurers want evidence. Regulators want action. Attackers want gaps.

If you can’t prove you’ve assessed your external exposure, you’re not covered – you’re exposed.

Our €1,500 Attack Surface Report helps you:
• Validate coverage readiness
• Identify unmanaged digital risk
• Take defensible, documented action

🎯 Stay insurable and protected: https://calendly.com/aumint/aumint-intro

#CyberInsurance #RiskManagement #ComplianceReady #InfosecLeadership #AUMINT

read more