in ,

Hackers target oil producers as they struggle with a record glut of crude, Ars Technica

Hackers target oil producers as they struggle with a record glut of crude, Ars Technica
    

      SIMPLE BUT EFFECTIVE –

             

The quality of spear-phishing is getting better. A recent run shows how.

      

      

           

As the world’s top oil producers prepared for a weeklong meeting earlier this month to plan a response to slumping prices of crude, espionage hackers commenced a sophisticated spearphishing campaign that was concentrated on US-based energy companies. The goal: install a notorious trojan that siphoned their most sensitive communications and data.

Setting the campaign apart, the emails were mostly free of the typos, broken grammar, and other sloppiness that are typical phishes. The emails also reflected a sender who was well-acquainted with the business of energy production. A barrage of emails that started on March , for instance, purported to come from Engineering for Petroleum and Process Industries, a real Egyptian state oil company. Not your father’s spear-phishing

The sender invited the recipient to submit a bid for equipment and materials as part of a real ongoing project, known as the Rosetta Sharing Facilities Project, on behalf of Burullus, a gas joint venture that’s half-owned by another Egyptian state oil company. The email, which was sent to about 404 oil and gas companies over a week starting on March , attached two files that masqueraded as bidding conditions, forms, and a request for proposal. The relatively small number of emails demonstrates a narrow targeting of the carefully crafted campaign. By contrast, many phishing non-discriminately send tens of thousands emails.

Hackers target oil producers as they struggle with a record glut of crude

Hackers target oil producers as they struggle with a record glut of crude The spear-phish in the campaign that began on March

Bitdefender
“To someone in the oil & gas industry, who has knowledge about these projects , the email and the information within might seem sufficiently convincing to open the attachments, ”researchers from security firm Bitdefender wrote in a post published on Tuesday . The most-targeted companies were located in Malaysia, the United States, Iran, South Africa, and Oman.

Bitdefender A second campaign started on April 17. It sent an email asking recipients to complete a document known as a Estimated Port Disbursement Account needed for the chemical and oil tanker named MT Sinar Maluku . Not only was that a real vessel registered under the Indonesian flag, it had left its port on April and was expected to reach its destination two days later. The email was sent to 31 companies, of which were shipment companies in the Philippines.

“This email serves as another example of the length to which attackers will go to get their facts straight, make the email seems legitimate, and specifically target a vertical.

What do you think?

Leave a Reply

Your email address will not be published. Required fields are marked *

GIPHY App Key not set. Please check settings

India Eases World's Biggest Lockdown but Coronavirus Cases are Spiking, Crypto Coins News

India Eases World's Biggest Lockdown but Coronavirus Cases are Spiking, Crypto Coins News

Coronavirus: Philippine labour office in Dubai suspends cash aid