In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
5 ways AI is being used by scammers
Artificial Intelligence (AI) has many benefits. It can help us do our work - especially boring, repetitive tasks - more quickly and efficiently. But, it also helps scammers do their work better too. Here are five ways that hackers are using AI. 1. Bypassing CAPTCHAs...
A new WhatsApp scam enables account hijacking
A new WhatsApp OTP (one-time password) hack has just been identified in India which enables scammers to takeover users’ accounts via a phone call. Whilst scams targeting WhatsApp are nothing new, this one takes advantage of external call forwarding services. How does...
Why “liveness tests” can be vulnerable to attack
To prevent fraud, companies are looking at increasingly sophisticated methods to verify customers’ identities. “Liveness tests” are one way of doing this, but it seems that even these are vulnerable to attack. What are “liveness tests”? “Liveness tests” are used by...