In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
4 cybercrime trends to be aware of in 2022
Whilst any cyber attack is unpredictable, there are trends that hackers follow. Here are some of the main ones to be aware of in 2022. 1. Current event-based phishing attacks Phishing is not a new tactic, however attacks are becoming increasingly sophisticated....
How to protect yourself against revenge attacks
Imagine an ex-employee, who was fired by your company, takes revenge by hacking into your IT system. They’re able to do this because passwords of systems they had access to have not been changed. Within a few hours they could potentially do significant damage to your...
5 ways to prevent tailgating in your company
You might not consider tailgating when developing your cybersecurity strategy, however it’s a form of social engineering which takes place in the physical world. It can be a tricky problem to tackle, but there are a few solutions. What is tailgating? Tailgating is...