复杂网络钓鱼行动“寄生虫”威胁全球能源巨头
“Power Parasites”网络钓鱼活动自2024年起针对全球能源巨头及大品牌展开攻击。该活动通过仿冒知名能源公司(如西门子能源、施耐德电气等)进行投资及工作机会诈骗,并建立超150个仿冒网站。主要目标为亚洲国家(如孟加拉国、尼泊尔和印度),利用多语言内容提升有效性。攻击者采用“广撒网”策略,并通过虚假网站、社交媒体群组及Telegram频道传播恶意链接。受害者被诱骗提供敏感信息或资金。 2025-4-26 12:54:50 Author: cybersecuritynews.com(查看原文) 阅读量:4 收藏

New Power Parasites Phishing Attack Targeting Energy Companies and Major Brands

A sophisticated phishing campaign dubbed “Power Parasites” has been actively targeting global energy giants and major brands since 2024, according to a comprehensive threat report released this week.

The ongoing campaign primarily exploits the names and branding of prominent energy companies including Siemens Energy, Schneider Electric, EDF Energy, Repsol S.A., and Suncor Energy through elaborately crafted investment scams and fraudulent job opportunities.

Portion of a document used in the hiring scam campaign (Source – Silent Push)

The attackers have established an extensive network of over 150 active domains designed to impersonate legitimate companies, primarily targeting individuals across Asian countries including Bangladesh, Nepal, and India.

Google News

Victims are approached through a combination of deceptive websites, social media groups, and Telegram channels, often with localized content in English, Portuguese, Spanish, Indonesian, Arabic, and Bangla to increase effectiveness.

Silent Push researchers identified that the threat actors employ a “spray and pray” methodology, simultaneously abusing multiple brand names while deploying numerous websites to maximize victim outreach.

The campaign’s infrastructure analysis revealed that the attackers utilize domain names containing keywords like “SE” (representing Siemens Energy) and “AMD” (for Advanced Micro Devices) combined with various domain suffixes, creating patterns such as “sehub.top” and “amd-biz.mom”.

The primary infection vectors involve social engineering through two distinct approaches. In the investment scam variant, victims are lured with promises of high returns through fake investment platforms supposedly backed by reputable energy companies.

Meanwhile, the job scam variant entices victims with fraudulent employment opportunities at well-known corporations, requiring applicants to provide sensitive personal and financial information including bank account details, identification documents, and void checks during the “onboarding” process.

Infection Mechanism and Technical Infrastructure

The Power Parasites campaign employs an intricate technical infrastructure designed for maximum reach and minimal detection.

Analysis of the deceptive websites reveals a consistent template pattern across domains, with login pages featuring an “Invite code” field-a classic technique used in investment scams to create a false sense of exclusivity.

The campaign’s promotion has extended to YouTube, where videos directing potential victims to malicious domains like “se-renewables.info” are published with enticing titles in multiple languages.

One such video, translated from Bangla, promised viewers they could “Earn free money from new sites,” demonstrating the attackers’ multilingual targeting strategy.

Technical fingerprinting conducted by security researchers uncovered that these phishing sites employ shared characteristics across their infrastructure, allowing them to rapidly deploy new domains when others are taken down.

The campaign also leverages Telegram channels containing “siemensenergy” in their names to distribute malicious links, though many have since been banned or deleted.

Siemens Energy has already published warnings about the fraudulent activities, explicitly stating they “do not operate any investment platforms” and “do not ask for fees prior/during/after the application process.”

Repsol phishing website (Source – Silent Push)

Similarly, Repsol Energy has established a Fraud Alert page cautioning about schemes that use artificial intelligence to impersonate their executive team.

Malware Trends Report Based on 15000 SOC Teams Incidents, Q1 2025 out!-> Get Your Free Copy


文章来源: https://cybersecuritynews.com/new-power-parasites-phishing-attack/
如有侵权请联系:admin#unsafe.sh