In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.

Nefilim Ransomware Attack Used “Ghost” Credentials.

According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services. 

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

🔍 Security Theater Won’t Save You – Real Operational Technology Visibility Will

📋 Most boards rely on ISO certs and audit checkboxes to feel “secure.”

💥 Reality check: attackers don’t care about your certifications – they care about your weak segmentation.

📊 Operational Technology environments are being linked to IT & cloud with zero risk modeling. Result? Massive exposure.

💡 True visibility + simulation = resilience.

🛡️ At AUMINT.io, we help boards see the blind spots – and test their real-world impact.

📆 Book your boardroom-ready Operational Technology simulation: https://calendly.com/aumint/aumint-intro

💬 What gives you false confidence in your cyber posture? Drop a truth bomb 👇

🔎 #CyberResilience #BoardSecurity #Operational TechnologyRisk #CISOTalk #AUMINT

read more

Chinese-Backdoored Networks Went Undetected for Years – Here’s How to Avoid Being Next

🕵️‍♂️ State Hackers Hid in US Networks for Years

🔍 Chinese spies quietly embedded malware into orgs via security appliances
🧠 These were not smash-and-grab attacks – they were patient, persistent, and personal
🚨 No traditional security tool detected it – humans never even saw it coming
⚙️ AUMINT.io’s Trident trains teams to recognize real-world stealth threats
📅 Let’s secure your human layer now – before they exploit it

#CyberEspionage #HumanLayerSecurity #AUMINT #NationStateThreats #SocialEngineeringDefense #CISO

read more

⚖️ Boards Are the New Cyber Risk Owners – Like It or Not

🧱 NIS2. DORA. The UK’s Telecoms Act. They all say one thing:

📌 If the board doesn’t act, they will be held personally accountable.

🔍 47% of EU CNI operators don’t plan to hire infosec staff. Meanwhile, attacks rise 87%.

🧨 This mismatch will cost lives – and reputations.

🧠 It’s time to move beyond “delegate it to IT.”

🛡️ AUMINT.io helps boards gain command over their OT/IT threat exposure with crisis-ready simulations.

🗓️ Book your private OT security walkthrough here: https://calendly.com/aumint/aumint-intro

💬 What board-level actions should be non-negotiable in 2025? Let’s build the list 👇

🔎 #NIS2 #CyberRegulations #BoardLiability #AUMINT #InfosecStrategy

read more