In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
🚨Are we on the brink of a cyber-war?🚨
📢 What happened? An allegedly Chinese-sponsored hacker group carried out a sustained cyberattack (2021-2023) on the Belgian State Security Service (VSSE), stealing sensitive information.The hackers exploited a vulnerability in Microsoft Exchange servers...
Ghost Code: The Sinister Rise of Invisible Phishing with Unicode Obfuscation 👻
Imagine a digital world where malicious code can hide in plain sight, invisible to the human eye and security scanners. This isn't science fiction; it's the reality of a new and alarming phishing technique uncovered by Juniper Threat Labs. Researchers have exposed a...
The Psychology of Phishing: Why We Fall For It
Phishing attacks, those deceptive emails or messages designed to steal your personal information, are a constant threat.But why do they work?It's not just about technology; it's about understanding the psychology behind these scams. Let's analyse the leverages that...