In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
Why cybersecurity is essential for customer trust
As companies are increasingly relying upon collecting consumers’ personal data - either because it’s essential to their operations or because they want to create unique customer experiences - the more they need to ensure they protect that data. Now, if you sell a...
5 of the most notable ransomware attacks in 2023
Now that we’re halfway through the year, it’s a good time to review the cybersecurity landscape, particularly around ransomware. Whilst the volume of ransomware attacks decreased by 23% in 2022 compared to 2021, there was ransomware resurgence in early 2023, with the...
3 ways generative AI can support cybersecurity
We recently looked at how generative AI, such as ChatGPT, is creating new cybersecurity challenges as it makes cybercrime more accessible. However, as with most new technology, it works both ways. Generative AI can also be leveraged by companies to enhance security....