Spear-Phishing Experiment Targets, Hooks Energy Firms

  /     /     /  
Publicated : 22/11/2024   Category : security


Spear-Phishing Experiment Targets, Hooks Energy Firms


More than one-fourth of utility employees in experiment fell victim to spearphishing emails



MIAMI, FL – S4 Conference – Spear-phishing is everywhere in targeted attacks today -- even in the SCADA/industrial control systems (ICS) world. A recent experiment involving two real-world utilities showed just how successful those types of campaigns can be: Twenty-six percent of utility employees clicked on a link in the phony emails.
The experiment, conducted last month by open-source intelligence expert Tyler Klinger of Critical Intelligence and Scott Greaux of PhishMe, also demonstrated how easy it is to gather the necessary intelligence to target key individuals within an ICS organization, including those with access to actual process control systems.
With the help of Digital Bond, Klinger was able to line up three utilities in the gas and electric industries to participate in the experiment. Klinger found valuable but seemingly benign information online in the public domain about employees at the utilities and then used that intelligence to craft convincing spear-phishing emails with malicious links. One of the three dropped out of the project after the first phase, but Klinger was able to fool employees with titles including control room supervisor, instrument technician, automation technician, pipeline controller, process control engineer, senior vice president of operations and management, and equipment diagnostics lead.
If 26 percent of your ICS people are able to get pwned, thats a pretty telling statistic, Klinger said in his presentation here yesterday. And all of the information he needed was available online, via LinkedIn, industry websites, company websites, job postings, crowdsourcing directory site Jigsaw, and other sites. He found users email addresses, job titles, SCADA product specialties, and other juicy information that could be used to craft convincing, targeted emails.
The goal was to determine how successful spear-phishing can be used in the ICS world, and to demonstrate how attackers can use open-source online intelligence to gain a foothold in a utility or other ICS organization.
This is pretty serious, says Digital Bonds Peterson. Given the list of titles of employees who fell for the email, an attacker trying to get remote access to a control room or other parts of the network would have hit pay dirt, he says.
Critical Intelligences Klinger said even if an attacker was unable to connect to the SCADA network via the victim, he would still have plenty of information from the user via emails and instant messaging, for instance.
Most people think that spear-phishing doesnt even apply to ICS, he said. But most major targeted attack campaigns against businesses and government entities have all started with a spear-phishing attack, he says, such as Shady RAT, Night Dragon, and Shamoon.
According to Trend Micro, 91 percent of targeted attacks involve spear-phishing.
The experiment was only about attacking via email, but its the cross-contamination that could occur afterward in a real attack thats, of course, the biggest risk, he said. An engineer with access to the network who downloads firmware ... if one whos hit then plugs in his machine in the process control network, an attacker could then mess with the ICS systems, he says.
The phony emails included ones posing as a message from a utility supervisor with a link that appeared to be from the firms website, and another that focused on a Rockwell product known by the victim and included a link that appeared to go to the vendors website.
Victims who fell for the ruse did so mostly from PCs, and a smattering of other devices were used, including an iPhone.
So how can utilities protect themselves and their employees from spear-phishing attacks? Klinger said you need to know where your company and employees information resides online in public view. Youve got to review the public source out there and how attackers can use this information, he said. Then implement policies accordingly.
Even an organizations email schema can be abused by attackers. One change would be to have ICS people have different emails, which would limit access on sites like Jigsaw, for instance, he says.
One control room supervisor who fell for the phish actually clicked on the phony link four times, wondering why it didnt work. He tried once and then, an hour later, tried again, Klinger says.
Have a comment on this story? Please click Add Your Comment below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security

▸ Hack Your Hotel Room ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Spear-Phishing Experiment Targets, Hooks Energy Firms