In 2020 Toll Group went twice through a ransomware attack, now Sophos which acted as a response and investigation team for the events, announces that the entry point was an account of an employee who died but remained active in the system.

Nefilim Ransomware Attack Used “Ghost” Credentials.

According to the report by Sophos, the Nefilim group responsible for the infidelity attack that was on the company’s network for about a month without the defense systems identifying suspicious activity, the user used by the attack group belonged to a deceased employee but his account was locked/deleted due to being integrated into various services. 

Read more about Examples and Numbers of Social Engineering attacks  ›

Save Your Company from Social Engineering Attacks Like that

 

Register and Get your Personalized Free Exposure Report NOW
and See your where your Company is Exposed to Hackers

Recently Published on our Blog

4 cybersecurity predictions for 2024

2023 was the year of generative AI and its impacts were felt across the cybersecurity landscape. Not only because of the threat it poses when in the hands of malicious actors, but also because of the way it can be used to tackle them. And realistically, generative AI...

read more

Cybercrime in the healthcare sector

No industry is safe from a potential cyberattack, but some are more attractive to criminals than others. The healthcare sector is one of the most targeted industries by cybercriminals, and has the highest data breach cost of any industry, averaging USD 10.93m. Why is...

read more

5 of the biggest data breaches of 2023

Last year was a big year of data breaches. By October 2023, there had already been 2,116 compromises in the US alone, compared to 1,802 in the entire 2022. And whilst the number of people affected in these attacks was just over half that of the previous year, it still...

read more