In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
4 tips from cybersecurity experts
Cybersecurity threats are constantly evolving and trends change rapidly, so it can be hard to know how to stay on top of it all. Following leading cybersecurity experts and keeping up to date with information they share is a good way to do this, so in this blog post...
Data breach vs data leak: what’s the difference?
Although the terms data breach and data leak are sometimes used interchangeably, they are actually quite different and can therefore require slightly different approaches when it comes to cyber security. So what are the differences? What is a data breach? A data...
Should businesses be wary of TikTok?
Over the last few weeks, a number of countries have banned the use of TikTok on government devices over concerns that confidential data could be shared with the Chinese government. Are these concerns legitimate and should companies be worried about employees using the...