In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
Software supply chain attacks: what are they and how to protect your business
There have been several examples of major global supply chains being disrupted due to ransomware attacks, such as the one affecting the automotive supply chain in February 2022. However, whilst attacks to physical supply chains aren’t new, the number of attacks on...
3 risky behaviours of employees and how to prevent them
Did you know that your employees are probably your biggest cybersecurity weakness? According to IBM Security X-Force’s Threat Intelligence Index 2023, 19% of breaches originate from the inside, and this is because so many involve a human element: social engineering,...
Which industries are most at risk of cyber attacks?
Whilst a cyber attack, such as a ransomware attack, could happen to any organisation, regardless of the size, location or type of business, there are some industries that are more likely to be targeted than others. Here are the three most targeted industries according...