In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
US 2020 Less Data Breaches but More Expensive
United States Reported Less Data Breaches in 2020 but with much more Expensive Successful Hacker Attacks According to the annual report of the Identity Theft Resource Center (ITRC), 1,108 cyber incidents were reported in 2020 and the number casualties from...
USCellular hit by a data breach after hackers access CRM software
Cellular communications operator USCellular announces that hackers have stolen customer information. According to the report, Hackers outwit some employees and get them to install malware on your office computer. The hackers managed to connect to the company computer...
CHwapi Hospital in Belgium Got Ransom Attacked
CHwapi Hospital in Belgium was attacked in a ransom attack, surgeries were postponed and patients were referred to other hospitals. The group of attackers, whose identities are unknown, reportedly encrypted about 80 servers and 100TB of information using Windows...