• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Advertise With Us
  • Contact
  • Cookie Policy
    • Privacy statement (CA)
    • Cookie policy (CA)
    • Privacy statement (UK)
    • Cookie policy (UK)
    • Privacy statement (US)
    • Cookie Policy (US)
    • Privacy statement (EU)
    • Cookie policy (EU)
    • Disclaimer

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Tech News
  • Tech Guide
  • Gadget & Apps

Energy firms in multiple countries hit by Trojan attack

Updated on Apr 1, 2015 by Guest Authors

Cyber attackers have launched a simultaneous intrusion into several energy firms in the Middle East, United States and UK in what Symantec believes is a cyber espionage. This kind of attack is designed to steal confidential data about corporate matters.

The attack came in a form of a string of emails that contain malicious files disguising as safe attachments. This is a common method of attack, in which a malware is sent to the target victim and when the file containing the malicious content is opened, a whole new Pandora’s box is opened.

hacker

Attackers can then spy on individuals to view sensitive content of their computer such as banking credentials, email addresses and other confidential data. This is particularly alarming because what is at risk here is the oil and gas industry, upon which many of us depend. Certainly the perpetrators of the attack have a strategic interest in those companies affected, given the lucrative business of oil and gas.

Specifically, the malware here is identified as a Trojan horse which, although does not spread in multiple computers like a virus, can do massive harm on a system in grand scale, far more destructive than a virus. The Trojan called Trojan.Loziak is being masked by hackers as a Microsoft Excel file that, when downloaded and opened in a computer, will scrape system configuration data off the machine. This way, attackers can find out what data is being contained in a targeted computer, thus determining whether to launch a stealthy attack on that machine.

Attackers use the Trojan malware to collect data on names, software installed and hardware details in a computer. Before the hackers perform the actual attack on the victim computer, they first install in a secret method another malware in the computer that will leave the system vulnerable to additional attacks. Symantec found that this malware is channeled through servers located in various parts of the world, such as the United States. UK and Bulgaria.

Targeted oil and gas companies are mostly based in such countries as the United Arab Emirates, Kuwait, Saudi Arabia, U.S., UK, and Uganda.

The entry point of this attack is an old exploit in Microsoft Windows, which according to Symantec has been used in previous cyber espionage campaigns. And they are aided by lax security practices on the part of the user. It appears this exploit has not been fixed yet. Again, the easiest way to avoid this attack is to update system software installed in the PC.

Disclosure: We might earn commission from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Footer

New iDPRT Printers – SP450, SP420, and Zeva 1966 Photo Printer Reviewed

Munbyn P44S Wireless Thermal Label Printer Review

Master & Dynamic MW75 Wireless Headphones Review – Get Lost in the Music

3DMakerPro Mole 3D Scanner Review – Affordable, Portable, and Easy To Use

Follow TechWalls

YoutubeFacebookTwitterInstagram

Recent Posts

  • New iDPRT Printers – SP450, SP420, and Zeva 1966 Photo Printer Reviewed
  • Munbyn P44S Wireless Thermal Label Printer Review
  • POLYWOOD Classic Folding Adirondack vs Member’s Mark Adirondack Chair – Which Is Better?
  • BLUETTI’s New Expandable Outdoor Solar Generator AC60 & B80

Copyright © 2023 · All Rights Reserved

Manage Cookie Consent
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional cookies Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}