In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
4 ways to embed a cybersecurity culture into your organisation
As the risk of cyber attacks and their impact grows, cybersecurity has now become a core pillar within the organisation. But, whilst it’s easy to say that it’s important, demonstrating this in practice can be difficult. For this, it requires cybersecurity to be...
How can a data breach impact your share price?
Discovering your company has experienced a data breach can have severe consequences. Not only does it impact those directly affected by the leak - such as your customers and employees whose data has been stolen - and your business, if confidential information is...
Ethical principles for AI in cybersecurity
The use of AI and machine learning (ML) is increasing across many industries, including cybersecurity. And whilst it can bring many benefits in helping professionals do their job of tackling increasingly complex cybersecurity threats, there are several problems that...