In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.

Nefilim Ransomware Attack Used “Ghost” Credentials.

According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services. 

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

Schools Under Siege: Tackling 3,000 Cyber Threats Weekly

🎓 U.S. Schools Face 3,000 Cyber Threats Weekly

💡 Schools aren’t just educating – they’re being attacked, with over 3,000 cyber threats per week targeting educational institutions .

🛡️ Threat vectors range from ransomware to phishing and DDoS – jeopardizing student data and disrupting daily learning.

📉 Underfunded IT teams and outdated systems make schools soft targets.

📚 Educators and staff often lack the training needed to spot sophisticated cyber tactics.

📈 To break this cycle, schools need:

Regular cybersecurity training

System upgrades and proactive patching

Comprehensive incident response protocols

🔐 At AUMINT.io, we provide education-specific cybersecurity: from risk assessments to live threat monitoring and staff training.

📲 Don’t wait until your school becomes a headline—protect now.

Book a Consultation with AUMINT.io

#CyberSecurity #EducationSafety #SchoolSecurity #ThreatIntelligence #AUMINT

read more

Partnering for Compliance: Why the Right IT Ally is Crucial in the EU Regulatory Landscape

🔐 Navigating EU Compliance: The Strategic Role of IT Partnerships

As EU regulations like DORA, NIS2, MiCA, and the EAA reshape the business landscape, compliance has become a technical imperative. Organizations must now integrate regulatory requirements directly into their IT infrastructure.

Choosing the right IT partner is crucial to:

Implement compliant systems.

Conduct risk assessments and resilience testing.

Ensure digital accessibility.

Stay ahead of regulatory changes.

Proactive compliance not only mitigates risks but also offers a competitive advantage by enhancing operational efficiency and building client trust.

#EUCompliance #ITPartnership #DigitalResilience #CyberSecurity #RegTech

read more

🔐 Stop Hackers Before They Start

Attackers target what you don’t see.

Employee data leaks, forgotten servers, weak endpoints.

AUMINT’s report maps your full attack surface for €1,500.

Don’t wait to get breached.

Book your security snapshot: https://calendly.com/aumint/aumint-intro

#CyberSecurity #AttackSurface #CISO #InfoSec #SOC #RiskManagement #AUMINT

read more