In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
The dark art of Remote Online Social Engineering by PWC
PWC Published it's resent Cyber security research: The dark art of Remote Online Social Engineering Research conducted on an emerging attack vector: threat actors using so-called ‘catfishing’ techniques to target organisations. Cyber security research: Can...
Scam-as-a-Service operation made more than $6.5 million in 2020
According to ZDNet: Scam-as-a-Service operation made more than $6.5 million in 2020 "Classiscam" operation is made up of around 40 groups operating in the US and across several European countries. Read more about Examples and Numbers of Social Engineering attacks...
Don’t fall for it: Health officials warn of scammers trying to charge for COVID-19 vaccine
Don’t fall for it: Health officials warn of scammers trying to charge for COVID-19 vaccine. The technique is called water hole, the scammers know people looks for COVID-19 vaccines, so they build officially look websites that sells vaccines.Florida health officials...