• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
Tech

Hackers attack the energy industry with malware designed for snooping

Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
March 31, 2015, 2:55 PM ET
A pump jack is seen at sunrise near Bakersfield
A pump jack is seen at sunrise near Bakersfield, California October 14, 2014. Brent crude hit a new four-year low on Wednesday before recovering to just under $85 a barrel, as faltering global growth curbed demand for fuel at a time of heavy oversupply. Oil saw its biggest daily fall in more than three years on Tuesday after the West's energy watchdog slashed its forecasts for world oil demand for this year and 2015. Picture taken October 14, 2014. REUTERS/Lucy Nicholson (UNITED STATES - Tags: ENERGY BUSINESS TPX IMAGES OF THE DAY) - RTR4ABEWPhotograph by Lucy Nicholson — Reuters

Hackers have been targeting energy industry workers with malicious emails containing malware that, when opened, leave the recipients vulnerable to snooping, software security giant Symantec reported Monday.

The campaign has primarily targeted Middle Eastern countries such as the United Arab Emirates, Kuwait, and Saudi Arabia. But it has also afflicted other nations as well, including the United States, the United Kingdom, and Uganda.

Because most of the companies singled out are involved in the energy business, Symantec speculated that the hackers are motivated by industrial espionage. “Whoever is behind these attacks may have a strategic interest in the affairs of the companies affected,” Symantec said in a blog post.

Having monitored this targeted email attack since the beginning of the year, Mountain View, Calif.-based Symantec (SYMC) reports that it discovered the malicious software program at its center on Feb. 11. The malware in question is a so-called trojan horse, a type of harmful software program that disguises itself as an innocent file.

In this case, the trojan—dubbed “Trojan.Loziak” by the researchers—masqueraded as a Microsoft Excel spreadsheet file. Once downloaded on a vulnerable machine, the previously unreported strain of malware steals information—like system configuration data—off of it. The malware appears to help the attackers determine whether a computer contains valuable data, and therefore whether it is an interesting target or not.

Here’s how the attack works: First the trojan performs an initial survey—collecting information about the computer’s name, installed software (including antivirus), and additional hardware specifications—and then it sends those details back to hackers responsible. If the hackers decide to proceed with the attack, they further infect the machines with additional malware, delivered via servers based in the U.S., U.K., and Bulgaria, according to Symantec. These include pieces of malware such as “Back.door.Cyberat” and “Trojan.Zbot,” which steal confidential information and open “backdoors,” leaving systems susceptible to further breaching.

To gain entry, the attack preys on the same vulnerability in Microsoft Windows that has been exploited in past espionage campaigns, such as Red October, the blog says. (Here’s Fortune’s story about a dispute between two security firms over the alleged resurrection of that campaign.)

Although the post concludes that the attack is relatively unsophisticated, it stresses that the campaign still poses a threat to those who do not keep up to date with the latest security updates.

The group behind the attack does not seem to be particularly advanced, as they exploited an old vulnerability and used their attack to distribute well-known threats that are available in the underground market. However, many people still fail to apply patches for vulnerabilities that are several years old, leaving themselves open to attacks of this kind. From the attacker’s perspective, they don’t always need to have the latest tools at their disposal to succeed. All they need is a bit of help from the user and a lapse in security operations through the failure to patch.

As long as users leave known vulnerabilities unrepaired, hackers will be able to continue to exploit computer systems with minimal effort.

About the Author
Robert Hackett
By Robert Hackett
Instagram iconLinkedIn iconTwitter icon
See full bioRight Arrow Button Icon

Latest in Tech

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Fortune Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map

Latest in Tech

cappelli
AIHuman resources
Wharton’s great contrarian says AI adoption isn’t an easy way to cut headcount: ‘The key thing … is just how much work is involved in doing it’
By Nick LichtenbergJanuary 10, 2026
4 hours ago
MagazineNetflix
Netflix’s $82.7 billion rags-to-riches story: How the a DVD-by-mail company swallowed Hollywood
By Natalie JarveyJanuary 10, 2026
6 hours ago
Bill Gates speaks onstage at the Bloomberg Philanthropies Global Forum 2025 at The Plaza Hotel on September 24, 2025 in New York City.
AIBill Gates
Bill Gates says AI could be used as a bioterrorism weapon akin to the COVID pandemic if it falls into the wrong hands
By Eleanor PringleJanuary 9, 2026
1 day ago
shapiro
Big TechMedia
Netflix’s competition isn’t sleep anymore. Its battle against YouTube is like fighting an ‘infinite number of monkeys,’ top strategist says
By Nick LichtenbergJanuary 9, 2026
1 day ago
Bill Gates pictured in New York, May 2025.
SuccessBill Gates
Read Bill Gates’s 2026 annual letter in full
By Eleanor PringleJanuary 9, 2026
1 day ago
A screen displays the Grok logo while a person holds another phone in front.
AIX
Lawmakers and victims criticize the choice to limit Grok’s AI image generation to paid users as ‘insulting’ and ‘not effective’
By Beatrice NolanJanuary 9, 2026
1 day ago

Most Popular

placeholder alt text
Health
Bill Gates warns the world is going 'backwards' and gives 5-year deadline before we enter a new Dark Age
By Eleanor PringleJanuary 9, 2026
1 day ago
placeholder alt text
Success
Diary of a CEO founder says he hired someone with 'zero' work experience because she 'thanked the security guard by name' before the interview
By Emma BurleighJanuary 8, 2026
2 days ago
placeholder alt text
Politics
White House says it's 'reviewing protocols' after Trump seemingly violated federal policy by disclosing jobs data early
By Eva RoytburgJanuary 9, 2026
22 hours ago
placeholder alt text
Workplace Culture
Amazon demands proof of productivity from employees, asking for list of accomplishments
By Jake AngeloJanuary 8, 2026
2 days ago
placeholder alt text
Success
Walmart’s CEO Doug McMillon out-earns the average American’s salary in less than 20 hours—during a typical 30-minute commute, he’s already made $1,563
By Emma BurleighJanuary 9, 2026
1 day ago
placeholder alt text
C-Suite
Silicon Valley billionaire flies coach out of solidarity: 'If I'm going to ask my employees to do it, I need to do it, too'
By Nick LichtenbergJanuary 9, 2026
22 hours ago

© 2025 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.