In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
Will you be reducing your cybersecurity headcount in 2024?
Despite increasing security incidents and growing threats of cyber attacks, almost half of organisations that took part in a recent study plan to reduce their security headcount. And, according to PwC, an estimated 20% of organisations will shrink or freeze their...
Top cybersecurity trends from 2023
Cybersecurity threats are constantly evolving as malicious actors change tactics and take advantage of emerging technologies to attack new targets, scale up their operations and evade capture. As a result, security professionals need to be aware of these changes. Here...
7 reasons why staff training is essential for cybersecurity
As companies around the world are looking to cut budgets and save money, one area that often falls victim is staff training. However, those organisations considering cutting back on cybersecurity training might want to think again. Here are seven reasons why: 1....