In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
4 ways ransomware is evolving
Ransomware remains a real threat for organisations, with more than 493m attacks in 2022 alone, down from 2021 but far above the amount in the preceding years. And one of the reasons that it remains a threat is because of the ability of ransomware gangs to evolve their...
How prepared are companies for a potential cyber attack?
The risk of cybersecurity attacks increases year on year, particularly as cyber criminals are now leveraging more sophisticated technologies and techniques to be able to carry out their activities at scale. For example, a small study recently showed that phishing...
A software supply chain attack that targets the banking sector
In a recent article, we highlighted the rise of software supply chain attacks. These types of attacks are very serious as, often, the target isn’t the software vendor itself but their customers. By accessing the end users’ systems, they are able to steal valuable...