Free Republic
Browse · Search
Topics · Post Article

Skip to comments.

Hackers posed as Egyptian oil contractor in apparent spy campaign ahead of OPEC meeting
Cyberscoop ^ | APR 21, 2020 | Jeff Stone

Posted on 04/23/2020 1:29:32 PM PDT by nickcarraway

Hackers are trying to infect organizations throughout the world with a popular strain of malware by sending emails that appear to be from an Egyptian oil company.

In research published Tuesday, Romanian antivirus company BitDefender noted a surge in attempted phishing attacks that try to trick users into downloading malware by masquerading as Enppi, an oil company owned by the Egyptian government. The malware, known as Agent Tesla, is a spyware tool which enables hackers to monitor keystrokes, steal data about file downloads and collect username and password credentials from internet browsers, among other capabilities.

The number of attacks spiked in the weeks before the world’s top oil producers debated whether to cut output during a meeting between the OPEC+ alliance and the Group of 20 nations, which suggests interest in specific countries’ strategies around an international standoff that’s had ramifications for the global economy. BitDefender researchers said hackers used the tool against energy organizations in the U.S., Malaysia, Iran, South Africa, Oman, Turkey and elsewhere.

The company did not speculate on who may have been behind the espionage effort.

The malicious emails highlighted by BitDefender demonstrate an amount of care that’s uncommon in other phishing efforts. The message, apparently from a major Egyptian oil company, invites recipients to submit a bid for a contract that seemingly involves equipment and materials for a project involving Burullus, another legitimate oil and gas company.

“Enppi is globally recognized as a major engineering, EPC main contractor, and management contractor, with decades of experience in onshore and offshore projects in the oil and gas, refining and petrochemical industries,” the message said, according to BitDefender.

The Agent Tesla malware has existed in some form since at least 2014, according to BitDefender, though it’s emerged as a popular remote administration tool (RAT) during the coronavirus pandemic. In recent weeks, hackers also have used Agent Tesla in a coronavirus-themed phishing campaign in which they posed as World Health Organization representatives, according to IBM. Unknown attackers also used the RAT to try to steal data from the international shipping sector, including movement of container ships, BitDefender said.

The nature of Agent Tesla could make it difficult to understand who is behind each campaign. More than 6,300 customers had enlisted in Agent Tesla’s subscription hacking service when KrebsOnSecurity investigated in 2018, with prices ranging from $15 to $69, depending on the capabilities.

TOPICS: Business/Economy; Culture/Society; Foreign Affairs; News/Current Events
KEYWORDS: agenttesla; bitdefender; blackhat; burullus; commodities; crime; cybercrime; cybercrimimals; economics; egypt; email; energy; espionage; groupof20; hackers; hydrocarbons; iran; maga; malaysia; malware; oil; oman; opec; phishing; romania; southafrica; spies; spoofing; spyware; turkey; us; who

1 posted on 04/23/2020 1:29:32 PM PDT by nickcarraway
[ Post Reply | Private Reply | View Replies]

To: nickcarraway

How much of hacked info makes its way to trading floors? I would think a lot.

2 posted on 04/23/2020 1:52:11 PM PDT by Track9 (Islam: Turning everything it touches to ShiÂ’ite since 632 AD)
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794 is powered by software copyright 2000-2008 John Robinson