In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
NATO horizon 2030 report predicts the rise of cyber AI / ML warfare
NATO horizon 2030 report predicts the rise of cyber AI / ML warfare. We are the only ones who already have an AI that can help you to defend against AI reinforced attacks. >> Add more data from the report <<
What can we learn from Mimecast Hacker Breach
Mimecast, which provides email management systems, updates that the hacker was able to hack into the company's systems and access customer information. According to the company, the hacker was able to gain access to a certificate used to identify Mimecast services...