pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Case Study on a Spear Phishing Campaign from the Energy Secto

Earlier this week, we wrote an article on the threats of spear phishing. We thought we could drive the lesson home with a story about a spear phishing attack that happened recently.

A very sophisticated spear phishing campaign has exploited a major energy company. The scam used a clever ruse to get around the organization’s Microsoft email security software. It relied on a complicated phishing attack that was sent from Google Drive. According to Aaron Riley, a researcher from cybersecurity firm Cofense, the scammers impersonated as the CEO of the organization.  The scammers sent an email via Google Drive and said they were sharing “sharing an important message” with the employees. Nobody wanted to disbelieve the CEO of the company.

The email was not sent directly by a hacker. The originator of the email was actually Google Drive. It was received by subordinates, but it triggered a major “warning”: the email address did not conform to the company’s internal naming convention for emails. But most employees wouldn’t take the time to verify the threat and clicked the link anyways, Riley told us. This proves that the desire to avoid investing a few seconds to versify something can be a tragic mistake.

The link was incorporated in email content. It linked to a legitimate Google Drive filled with numerous documents that employees could download. Also, Microsoft’s email spam detection tool does not determine the destination that the user is going to be taken after clicking on the link on the Google Drive. Even though the Google Drive link may not look malicious, the final destination that the user will be referred to could contain malicious malware or be part of a devious social engineering scheme by hackers. As a result, the user could be lulled into  a false sense of security.

Let’s review the email received by employees:

Dear colleague, I want to share a few thoughts and deliver a quick review regarding topic X. These thoughts will be explained in detail. All employees are obligated to read, know and interpret it, as well as share their opinions. I appreciate your constant help in improving our organization. CLICK HERE TO SEE THE UPDATE. Note: the message is of great import and all workers should view the link.

Riley explained that scanning past the first link wouldn’t solve the problem. The email inspection application still would not be able to evaluate links that were present on the following pages unless the user was trying to download them.

The phishing attack was not detectable, because there was not an immediately visible threat.

Once a user accessed a document on Google Drive, nothing immediately happened that was malicious. The targets were given an explanation of a public business decision by the “CEO” and then asked to view a related document via another link.

Any employees that decided to click the link embedded in the Google Drive document were sent to a fake login page that had recently been registered at the domain. Once the victims provided their credentials, they were shared with the scammers.

The real lesson here is that employees could have been taught to look for suspicious emails and could have prevented the attack. In addition to the fact that the CEO’s email address was incorrect, the information about the “business decision” was over a year out of date. Additionally, two sentences in the document contained very poor English: “I appreciate your constant help in improving our organization” and “the email is of great import and all employees should access the link”, which are informal. This is already a warning sign that should not have been missed.

Riley noted that exactly the same sentences were witnessed in a similar scam that had targeted major universities, indicating that the hacker has a known MO, which will make it easier to detect future phishing. By recognizing sentences that have already been used, a future attack could be recognized. It is important, then, to pay special attention to the content of an email you receive.

Filed Under: Articles

Latest Articles

HR Software Market to Reach $30 Billion as New Solutions Introduced

The market for HR software applications is growing at a tremendous pace. One study predicts that the market will be worth $30 billion by 2025. The benefits of HR software are indisputable, as a growing number of companies are starting to recognize the need to use more efficient options to manage … [Read More...]

Superman Coupon Removal

  SupermanCoupon is a new adware program that is wreaking havoc on the Internet and on people's computers lately. The software should be removed from your system as soon as you notice it because it provides no clear positive purpose to be on your computer. Like many other applications it … [Read More...]

How to Develop Your Crypto Exchange Business

Cryptocurrencies have entered the mainstream, and even the most conservative governments are starting to realize that they are poised to affect the global economy in the future. The market for cryptocurrencies is projected to be worth $2.2 billion within the next five years. Growing adoption is a … [Read More...]

Gaming Laptop Security Guide: Protecting Your High-End Hardware Investment in 2025

Since Jacob took over PC Tech Guide, we’ve looked at how tech intersects with personal well-being and digital safety. Gaming laptops are now … [Read More...]

20 Cool Creative Commons Photographs About the Future of AI

AI technology is starting to have a huge impact on our lives. The market value for AI is estimated to have been worth $279.22 billion in 2024 and it … [Read More...]

13 Impressive Stats on the Future of AI

AI technology is starting to become much more important in our everyday lives. Many businesses are using it as well. While he has created a lot of … [Read More...]

Graphic Designers on Reddit Share their Views of AI

There are clearly a lot of positive things about AI. However, it is not a good thing for everyone. One of the things that many people are worried … [Read More...]

Redditors Talk About the Impact of AI on Freelance Writers

AI technology has had a huge impact on our lives. A 2023 survey by Pew Research found that 56% of people use AI at least once a day or once a week. … [Read More...]

11 Most Popular Books on Perl Programming

Perl is not the most popular programming language. It has only one million users, compared to 12 million that use Python. However, it has a lot of … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Google Apps For Business is Making Strides

Google has evolved over the years. It was once only a search engine, and a darn good one. But, the company behind the search engine has evolved into a … [Read More...]

Speedstep – Intel’s mobile CPU dynamic power management architecture

Just a few weeks after its launch of the Dixon, Intel demonstrated a revolutionary new mobile processor technology that was expected to close the … [Read More...]

SCSI Interface Evolution

SCSI-1, the original 1986 standard, is now obsolete. It used asynchronous transfer, where the host and the device, blind to … [Read More...]

[footer_backtotop]

Copyright © 2025 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors