In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
4 key payments ecosystem threats to look out for
The payments ecosystem has always had to consider cybersecurity carefully, but since the rapid expansion of digital payments (thanks, in part to the pandemic), it’s become critical. Particularly as cybercriminals and hackers have also become more sophisticated in...
Could your suppliers be your biggest security risk?
Ensuring the security of your own network, and making sure you have systems and processes in place to minimise the risk of cyber attacks is crucial. But what about your suppliers? If they don't take the same precautions, they could make your business vulnerable. ...
How Slack can help hackers break into your systems
Whilst Slack can be a great collaboration tool, especially for remote teams, there are a number of vulnerabilities that IT security teams need to be aware of. And several recent high profile hacks highlight this. EA Games hack For example, in 2021 hackers were able to...