In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
Top social engineering statistics from 2023
In 2023, we’ve seen a number of high profile cybersecurity incidents, including a cyberattack on MGM Resorts International which cost them an estimated $80 million in revenue over five days, and a data breach from personal genomics and biotechnology company, 23andMe...
How to optimise your threat monitoring strategy
With many businesses around the world facing difficult financial decisions, it’s likely that cost savings will need to be made somehow, including in cybersecurity. However, this is happening at a time when cybersecurity threats are increasing. One way to balance the...
Rhysida: A new high-profile ransomware gang
A recent ransomware attack on the British Library, where personal data was stolen and has appeared online for sale, has revealed a new ransomware gang to be aware of. Its name is Rhysida. Here’s more about who they are and how they operate. Who is Rhysida?...