In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.

Nefilim Ransomware Attack Used “Ghost” Credentials.

According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services. 

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

5 ransomware groups to be aware of

Ransomware attacks are increasingly focusing on bigger targets, with several major international companies falling victim in recent years. As a result, it’s crucial for all companies to take these sorts of threats seriously. Knowing who you’re dealing with is the...

read more

Why you should only use your work laptop for work

If you’re someone who quickly checks their personal email or browses social media on their work laptop, then you’re not alone. According to a 2020 survey by antivirus vendor Malwarebytes, 53% of respondents reported sending or receiving personal email, 38% shopped...

read more

Is multifactor authentication enough?

Whilst multifactor authentication (MFA) is better than single-factor authentication (i.e., only a username and password), cybercriminals are finding ways to bypass it making it less secure than many think.  And there have been some high profile cases where criminals...

read more