In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.
Nefilim Ransomware Attack Used “Ghost” Credentials.
According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services.
Read more about Examples and Numbers of Social Engineering attacks ›
Save Your Company from Social Engineering Attacks Like that
Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers
Recently Published on our Blog
Should cybersecurity be taught in schools?
As we live in an increasingly digital world - for both our personal and professional lives - children are required to immerse themselves in technology from a much younger age. However, they aren’t really equipped to deal with the dangers that present themselves...
Cybercrime in the financial sector
Banks and financial institutions are one of the biggest targets for cybercriminals, and in recent years have seen record numbers of attacks. For example, 2021 saw an all-time high of 2,527 attacks which reduced to 1,829 in 2022 (although this is still more than in the...
2024 Trends
TL;DR: Aumint.io, my startup, offers hope. The results of a recurring cyber training program show that practical training reduces human cyber risk and improves behaviours. 2024 Q1 - Landscape/ Macro trend Employee behaviour matters.Having employees with strong...