April 3, 2015 By Douglas Bonderud 2 min read

A new cybercriminal group is reportedly targeting global energy sector companies in an effort to collect data on their networked computer systems and decide whether all-out malware attacks are likely to succeed. So far, most of these reconnaissance efforts have focused on corporations in the Middle East, but companies in the United States and the United Kingdom are also on the list. Are energy companies in danger of losing their trade secrets?

Powering Through

According to Tripwire, the new malware attack — known as Trojan.Laziok — starts with a series of spam emails from the moneytrans[.]eu domain, which functions as a type of Simple Mail Transfer Protocol server. If users download and open the attached Excel file, the malware payload activates and the exploit code is executed.

The result is a nasty little bug that hides itself in the %SystemDrive%\Documents and Settings\All Users\Application Data\System\Oracle directory and collects system configuration data that is sent back to attackers. Depending on what is discovered, cybercriminals can choose to send new malware files or simply observe until they find an opening. It’s also worth noting that Laziok can create new folders and rename files in an attempt to hide its presence.

As noted by ZDNet, the bulk of these reconnaissance efforts are focused on the Middle East, with 25 percent of cases cropping up in the United Arab Emirates, 10 percent in Saudi Arabia, 10 percent in Kuwait and 10 percent in Pakistan. The aim doesn’t seem to be total system shutdown or forced failure, but rather finding and capturing trade secrets.

Malware Attacks Are Nothing New

This isn’t the first time energy sector businesses have been targeted. In November 2014 the Regin malware was used to spy on calls and communications routed through company networks, and in June of last year a group called Dragonfly used the Havex malware in an attempt to get booby-trapped apps onto energy sector systems.

While it’s no surprise another set of malware attacks has cropped up, Symantec notes the group behind the new Laziok attack “does not seem to be particularly advanced, as they exploited an old vulnerability and used their attack to distribute well-known threats that are available in the underground market.”

In other words, they’re aiming for low-hanging fruit and hoping to spy on energy sector companies that haven’t applied patches or updates for problems that are several years old. This is no small issue — Threatpost reported in January that 50 percent of companies still don’t make use of automatic updating and patching tools.

The bottom line for energy sector companies is that there’s no end to malware threats in sight. While the days of attacks targeting critical systems to cause massive power outages or network shutdowns seems to have passed, new attackers are now looking to steal corporate secrets. Laziok is just a warning shot; expect greater firepower in the days to come.

More from

FYSA — VMware Critical Vulnerabilities Patched

< 1 min read - SummaryBroadcom has released a security bulletin, VMSA-2025-0004, addressing and remediating three vulnerabilities that, if exploited, could lead to system compromise. Products affected include vCenter Server, vRealize Operations Manager, and vCloud Director.Threat TopographyThreat Type: Critical VulnerabilitiesIndustry: VirtualizationGeolocation: GlobalOverviewX-Force Incident Command is monitoring activity surrounding Broadcom’s Security Bulletin (VMSA-2025-0004) for three potentially critical vulnerabilities in VMware products. These vulnerabilities, identified as CVE-2025-22224, CVE-2025-22225, and CVE-2025-22226, have reportedly been exploited in attacks. X-Force has not been able to validate those claims. The vulnerabilities…

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

10 min read - Introduction Over time, both targeted and large-scale enumeration of Active Directory (AD) environments have become increasingly detected due to modern defensive solutions. During our internship at X-Force Red this past summer, we noticed FalconForce’s SOAPHound was becoming popular for enumerating Active Directory environments. This tool brought a new perspective to Active Directory enumeration by performing collection via Active Directory Web Services (ADWS) instead of directly through Lightweight Directory Access Protocol (LDAP) as other AD enumeration tools had in the past.…

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today