In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
Protecting your brand from deepfakes in the metaverse
The metaverse might still seem futuristic for many companies, but it’s likely to become an important way of connecting with people and customers in future. Some companies are already conducting business in the metaverse. Whilst you might not be ready to join them,...
Why cybersecurity teams need oversight of social media accounts 
These days, if your business doesn’t have a presence on social media - whether that’s Twitter, Facebook or LinkedIn - you’re missing a trick. It’s becoming a vital way to connect with customers. However, it also creates a vulnerability that you might not be...
“Europol ploy”: the latest phone scam in Europe
A new phone scam is on the rise in Germany and other parts of Europe in which scammers impersonate Europol officers to trick victims into transferring them money, vouchers or personal details. How does the scam work? First, you will receive a call with a recorded...