In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
Your Phone Just Became a Cybersecurity Battleground – Are You Ready for the Smishing Surge?
📲 Smishing Attacks Are Smarter Than Ever – Is Your Team?
⚠️ Corporate smishing is up – and attackers are texting like pros
📉 These aren’t spammy scams – they use names, roles, urgency, and AI
💥 One tap on a fake text link can trigger full-blown compromise
🔒 AUMINT.io’s Trident simulates real-world SMS attacks so teams build mobile instincts
📅 Book a free training session now
#Smishing #CybersecurityAwareness #MobileSecurity #SocialEngineering #HumanFirewall #AUMINT
AI Can Now Create Deepfake CEOs – Is Your Team Prepared to Spot the Lie?
🎭 Deepfake CEOs Are Fooling Real Employees – Are Yours Next?
🧠 AI-generated audio and video are now good enough to impersonate your execs
🎯 One video or call from a fake “CEO” could cost millions in minutes
🔐 Most teams aren’t trained to detect AI deception – Trident fixes that
⚠️ The human layer is your weakest link – or your strongest defense
📅 Train your team before it’s too late
#DeepfakeFraud #ExecutiveImpersonation #AIThreats #HumanLayerSecurity #AUMINT #CyberAwareness
🔍 Security Theater Won’t Save You – Real Operational Technology Visibility Will
📋 Most boards rely on ISO certs and audit checkboxes to feel “secure.”
💥 Reality check: attackers don’t care about your certifications – they care about your weak segmentation.
📊 Operational Technology environments are being linked to IT & cloud with zero risk modeling. Result? Massive exposure.
💡 True visibility + simulation = resilience.
🛡️ At AUMINT.io, we help boards see the blind spots – and test their real-world impact.
📆 Book your boardroom-ready Operational Technology simulation: https://calendly.com/aumint/aumint-intro
💬 What gives you false confidence in your cyber posture? Drop a truth bomb 👇
🔎 #CyberResilience #BoardSecurity #Operational TechnologyRisk #CISOTalk #AUMINT