In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
Disinformation and election interference in 2024
Next year is set to be a big year for elections, with 65 national-level ones taking place across 50 countries. In fact, between October 2023 and the end of 2024, 71% of people living in democracies will vote in an election. This has raised some concerns around how...
5 dangers of using generative AI
Generative AI, such as ChatGPT or Google's Bard, has revolutionised the way we work and use the internet. However there are some dangers that you need to be aware of to prevent it having a negative impact on your business. 1. Privacy Most generative AI tools are...
European Cybersecurity Month focuses on social engineering
Throughout the month of October, the EU holds their annual cybersecurity campaign which focuses on promoting cybersecurity among EU citizens and organisations. This is done through various activities including conferences, workshops, training and webinars. This...