Pro-Iranian Nasir Security is targeting energy companies in the Gulf
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得通读整篇文章,抓住主要信息。 文章主要讲的是一个名为Nasir Security的网络犯罪集团,据信与伊朗有关联。他们正在针对中东地区的能源公司进行攻击。Resecurity公司追踪到了这个活动。 攻击的目标包括迪拜石油、CC Energy Development等公司,以及沙特阿拉伯的Al-Safi Oil Company。攻击手段包括钓鱼邮件、伪装身份和利用公共应用程序漏洞。他们窃取的数据包括合同、风险评估报告等,这些信息可能被用来策划进一步的攻击。 此外,文章提到由于目前的地区冲突,伊朗可能在利用网络空间进行心理战和宣传。不过,由于活动暂停和信息有限,归属特定行为者时需要谨慎。 现在,我需要将这些要点浓缩到100字以内。要确保涵盖主要的攻击者、目标、手段以及影响。 可能的结构是:介绍Nasir Security及其关联;目标行业和地区;攻击手段;数据窃取的影响;以及背景中的地区冲突和潜在的心理战。 最后检查字数是否符合要求,并确保语言简洁明了。 </think> 伊朗关联的Nasir Security网络犯罪集团正针对中东能源公司发起攻击,利用供应链漏洞窃取敏感数据以策划进一步打击。该组织通过钓鱼邮件、伪装身份和漏洞利用等手段实施攻击,并可能为后续针对能源基础设施的行动做准备。中东地区持续的冲突使能源行业成为网络攻击的重点目标。 2026-3-23 14:39:0 Author: securityaffairs.com(查看原文) 阅读量:9 收藏

Pro-Iranian Nasir Security is targeting energy companies in the Gulf

Resecurity tracks Iran-linked Nasir Security targeting Middle East energy firms amid ongoing regional cyber and military threats.

Resecurity (USA) is tracking a relatively new cybercriminal group called Nasir Security, presumably associated with Iran, that is targeting energy organizations in the Middle East. The energy sector is one of the most impacted areas because of the Iranian malicious activity in the region, including the lockdown of the Strait of Hormuz and drone/missile attacks against the energy infrastructure of neighboring countries in the GCC, allies of the US. 

Based on the artifacts collected by the threat intelligence team at Resecurity, the group is attacking supply chain vendors involved in engineering, safety, and construction. The data stolen as a result of such incidents is authentic but originates from a third party (of the target company), which may lead to incorrect assumptions about the origin of the breach. Notably, the focus of the attacks is centered on the energy sector, which has experienced significant financial and technological damage since the start of the war in Iran. Cyberspace is used to amplify it, following recent attacks against LNG and logistics providers.

The group has targeted Dubai Petroleum (UAE), CC Energy Development (Oman), an Iraq-based organization in the oil and gas sector, Al-Safi Oil Company (PURE IN), which operates gas stations in the Kingdom of Saudi Arabia (KSA) and other regions. In all these cases, Resecurity’s assessment indicated data theft from their vendors, such as engineering, construction companies, and safety equipment providers. However, there are still risks associated with this activity, as the documents acquired are authentic and may contain important information for adversaries. The stolen data includes schemes, contracts, risk assessment reports, and other documents.

Documents acquired by threat actors may provide them with additional context and insights to plan further attacks and serve as a pre-positioning stage for targeted strikes against oil fields and pipeline infrastructure. This includes identifying key infrastructure components that, if damaged, would significantly impact the facility and be difficult to repair. Both factors will make recovery from the attack challenging and likely time-consuming, especially since some equipment has long lead times. 

As TTPs, the actors are leveraging business email compromise (BEC) via targeted spear phishing (T1566), impersonation (T1656), and exploiting public-facing applications (T0819), exfiltrating data from insecure cloud storage services (T1530). The identified activity illustrates a successful combination of supply chain attacks and a disinformation (propaganda) campaign by Iran and its proxies during the war.

Considering the significant pause in the group’s activity (since October, 2025), along with the relatively low-profile nature of the group and the absence of social media profiles, the attribution of such activity to a specific actor, party, or country should be done with extreme caution—especially during active geopolitical conflicts. Resecurity expects an increase in ‘false flags,’ psychological operations (psy ops), and influence campaigns amplifying current events in Iran.

The IT and OT supply chain is expected to be a high-priority target for Iran, enabling it to generate quantitative rather than qualitative results to demonstrate counteraction during the war, leveraging cyberspace as a critical domain of warfare and psychological operations (psyops).

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Nasir Security)




文章来源: https://securityaffairs.com/189865/cyber-warfare-2/pro-iranian-nasir-security-is-targeting-energy-companies-in-the-gulf.html
如有侵权请联系:admin#unsafe.sh