In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.

Nefilim Ransomware Attack Used “Ghost” Credentials.

According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services. 

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

How to do cybersecurity on a budget

Businesses globally are going through a tough economic period and as a result, budgets are being cut. Cybersecurity can be one of the first departments to see cuts, as they don’t directly contribute to increasing revenues. However, given the cost of cybercrime is...

read more

Crypto-ransomware vs doxware: What are the differences?

Hackers use a variety of malware to achieve their aims. And as they become more sophisticated, and techniques evolve to combine different types of attack strategies, it can be confusing to understand the differences between them. In this article, we’re going to look...

read more

How is generative AI impacting cybersecurity?

Generative AI has been hitting the headlines recently with the release of ChatGPT at the end of 2022. And while it can be considered a useful tool for certain types of tasks, it is also posing a threat to companies, as hackers are using it to create more realistic...

read more