A Nigerian national based near the country’s capital masterminded a wave of attacks on over 4,000 companies in oil & gas, mining, construction and transportation sectors
Check Point® Software Technologies Ltd. (NASDAQ:CHKP) has today revealed the identity of the criminal behind a series of what appeared to be state-sponsored cyberattacks targeting over 4,000 companies in the energy, mining and infrastructure sectors.
The cyber attack campaign started in April 2017, and has targeted some of the largest international organizations in the oil & gas, manufacturing, banking and construction industries. The global scale of the campaign and the organizations targeted suggest an expert gang or state-sponsored agency is behind it: but the campaign is the work of a lone Nigerian national in his mid-20s, living near the country’s capital. On his Facebook account, he uses the motto: ‘get rich or die trying’.
Yarra Square Partners returned 19.5% net in 2020, outperforming its benchmark, the S&P 500, which returned 18.4% throughout the year. According to a copy of the firm's fourth-quarter and full-year letter to investors, which ValueWalk has been able to review, 2020 was a year of two halves for the investment manager. Q1 2021 hedge fund Read More
His attack campaign used fraudulent emails which appear to originate from oil and gas giant Saudi Aramco, the world’s second largest daily oil producer, targeting financial staff within companies to trick them into revealing company bank details, or open the email’s malware-infected attachment.
He used NetWire, a remote access Trojan which allows full control over infected machines, and Hawkeye, a keylogging program. The campaign has resulted in 14 successful infections, earning the criminal thousands of dollars in the process.
Maya Horowitz, Threat Intelligence Group Manager for Check Point said: “Even though this individual is using low-quality phishing emails, and generic malware which is easy to find online, his campaign has still been able to infect several organizations and target thousands more worldwide. It shows just how easy it is for a relatively unskilled hacker to launch a large-scale campaign that successfully breaches the defenses of even large companies, enabling them to commit fraud.”
“This emphasizes the need for organizations to improve their security to protect against phishing or business email compromise scams, and to educate employees to be cautious about opening emails, even from companies or individuals that they recognize.”
Since uncovering the campaign and establishing its origins, Check Point’s research team has notified law enforcement authorities in Nigeria and internationally and shared its findings with them.
Business Email Compromise (BEC) attacks have increased dramatically over the past 18 months. The FBI reported a 270% increase in victims since the start of 2016, costing organizations globally over US $3 billion from 2013 to 2016, and estimates that BEC victims lose $50,000 on average.
The Check Point Anti-Spam & Email Security Software Blade protects customers from falling victim to such scams. Its multidimensional approach protects email infrastructure, provides highly accurate anti-spam coverage, and defends organizations from a wide variety of virus and malware threats delivered by email. In addition, SandBlast™ Agent with Zero Phishing™ technology protects organizations from new and unknown phishing sites, as well as from threats contained in documents and links within emails.
For more information about the techniques used by the individual to target organizations, visit: http://blog.checkpoint.com/2017/08/15/get-rich-die-trying-case-study-real-identity-behind-wave-cyberattacks-energy-mining-infrastructure-companies/