In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.

Nefilim Ransomware Attack Used “Ghost” Credentials.

According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services. 

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

🔒 Your Team Could Be Your Biggest Cyber Risk

Technology isn’t the only entry point for hackers.

Employees accidentally expose your org every day:
• Misconfigured cloud storage
• Over-shared info on social media
• Weak passwords and reuse

AUMINT’s Attack Surface Report reveals these human-layer threats.

All for €1,500, with actionable fixes.

Don’t wait for a breach.

🚀 Book your security snapshot: https://calendly.com/aumint/aumint-intro

#HumanRisk #CISO #CyberDefense #SOC #InfoSecEurope #GDPR #AttackSurface #AUMINT

read more

Paying Ransoms? You Might Be Paying Again – And Again

💸 Paying Ransoms? Expect Repeat Attacks Soon

Nearly 80% of organizations that pay ransom demands face a second attack – often from the same cybercriminals.

Some see follow-up attacks within just weeks, with ransom demands rising by over 20%.

Paying doesn’t guarantee data recovery or safety from exposure. Many victims report corrupted or stolen data despite paying.

This reveals a harsh truth: paying ransom is a temporary fix that invites future risks and costs.

Your organization needs a shift – from reacting after an attack to preventing it altogether.

At AUMINT.io, we help you build defenses that detect ransomware early and protect your critical data long-term.

Don’t wait until it’s too late.

Book a Consultation with AUMINT.io

#Cybersecurity #Ransomware #ThreatIntelligence #DataProtection #SecurityAwareness #CISO #ITSecurity

read more

Scattered Spider: The Silent Threat Exploiting IT Support Teams

🕸️ Scattered Spider’s Sneaky Attack on IT Support Teams

The most dangerous cyberattacks don’t always come from code – they come from exploiting human trust.

Scattered Spider, a cybercriminal group from the US and UK, has mastered this by targeting IT support teams with sophisticated voice phishing (vishing) and impersonation.

By pretending to be legitimate employees, they trick IT teams into resetting passwords or bypassing multi-factor authentication (MFA). This approach slips past even strong technical defenses.

What’s more alarming? They partner with ransomware-as-a-service groups like DragonForce to launch full-scale attacks after gaining entry.

This shows why strengthening human defenses is now as crucial as firewalls and antivirus software.

Want to learn how to protect your IT teams and your business from such stealthy threats?

At AUMINT.io, we specialize in tailored cybersecurity solutions that combine real-time threat intelligence with behavioral analytics to detect and block these human-centric attacks.

Don’t wait for a breach – take control now.

Book a Consultation with AUMINT.io

#Cybersecurity #SocialEngineering #ITSupport #FraudPrevention #SecurityAwareness #CISO #SecurityOps #ThreatIntelligence

read more