In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.

Nefilim Ransomware Attack Used “Ghost” Credentials.

According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services. 

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

The Future of Cybersecurity Is Proactive – Not Reactive

⚡ Proactive Cybersecurity Is No Longer Optional

🚨 Every breach starts with one overlooked gap – and by the time you notice, attackers are already inside.

🛡️ Reactive defense is outdated. Attackers move faster, automate their methods, and prey on human trust. Waiting for alerts is no longer protection.

👥 The real frontline is your people. Social engineering and phishing target employees daily because attackers know it’s the easiest entry point.

💡 Proactive resilience means recurring simulations, awareness training, and insights that turn employees into defenders instead of risks.

📊 That’s why AUMINT.io built Trident – a proactive platform designed to simulate social engineering attacks, deliver real-time insights, and help CISOs strengthen their human layer before it’s exploited.

🚀 The surprising truth? Prevention is no longer about technology alone – it’s about people. And the organizations that prepare their teams proactively will outpace every attacker.

👉 Ready to move from reactive defense to proactive resilience? Book your introduction call here
.

#CISO #CTO #CEO #CyberSecurity #FraudPrevention #SocialEngineering #HumanRisk

read more

Shadow IT and Zero Trust – Navigating the Next Wave of Chaos

💥 Shadow IT Is Breaking Zero Trust Faster Than You Think

🚨 In 2025, Shadow IT isn’t a side risk – it’s the chaos that undermines even the strongest cybersecurity frameworks.

🔒 Zero Trust sounds solid on paper – but if employees adopt tools outside approved channels, “never trust, always verify” loses its foundation.

👥 The surprising truth? Shadow IT is less about technology and more about human behavior. Employees turn to unsanctioned apps when official tools feel too slow or restrictive.

🎭 Attackers know this and exploit it – using fake portals, unauthorized logins, and social engineering tactics to steal access credentials hidden in plain sight.

📊 This is where proactive resilience matters. By simulating Shadow IT-driven attack scenarios and revealing where risks are highest, CISOs can finally close blind spots before criminals strike.

🚀 At AUMINT.io, our Trident platform was built for this reality – turning Shadow IT chaos into actionable visibility and strengthening people as the true frontline.

👉 Ready to see how to take back control? Book your introduction call today
.

#CISO #CTO #CEO #CyberSecurity #FraudPrevention #ShadowIT #ZeroTrust

read more

Social Engineering Through Zoom – The Scam That Outsmarted Security Teams

📹 Zoom Calls Are the New Cybercrime Weapon

⚠️ A fake Zoom invite just fooled an entire security team. Attackers impersonated trusted partners, sending flawless invites that executives clicked without hesitation.

💡 Why did it work? Because employees are conditioned to trust meeting links – and attackers know it.

📊 The GK8 incident proves no company is immune. Even strong defenses crumble when attackers exploit human psychology instead of code.

🧠 This is the frontline of cybersecurity: the human factor. Firewalls and filters can’t stop a convincing Zoom call. Only recurring simulations and awareness training prepare employees to spot the trick before it’s too late.

🚀 That’s why AUMINT.io built Trident – to simulate attacks like fake invites and expose real vulnerabilities before criminals exploit them.

🔑 The biggest surprise? Social engineering is not a technical failure, but a behavioral one. That’s why prevention must focus on people, not just systems.

👉 Want to see how your team would handle a fake Zoom attack? Book your session here
.

#CISO #CTO #CEO #CyberSecurity #FraudPrevention #SocialEngineering #HumanRisk

read more