The “Power Parasites” scam campaign has emerged, targeting individuals in Asia, particularly in Bangladesh, Nepal, and India, with deceptive job and investment scams. High-profile energy brands like Siemens Energy, Repsol, and Suncor Energy have been impersonated in these scams, which utilize various online platforms for their operations. Threat analysts are actively investigating this campaign to track its infrastructure and mitigate its impact.
Affected: Siemens Energy, Repsol S.A., Suncor Energy, EDF Energy, Schneider Electric, individuals in Bangladesh, Nepal, India
Affected: Siemens Energy, Repsol S.A., Suncor Energy, EDF Energy, Schneider Electric, individuals in Bangladesh, Nepal, India
Keypoints :
- The scam campaign is named “Power Parasites.”
- It primarily targets individuals in Asian countries, including Bangladesh, Nepal, and India.
- Fraudulent investment and job scams are being conducted under the names of major energy brands.
- Siemens Energy has publicly warned against these scams.
- Repsol and Suncor have also issued warnings about their names being misused for fraudulent purposes.
- The campaign remains active, with numerous domains being used for scams.
- Threat analysts are developing technical methods to track the evolving infrastructure of this ongoing campaign.
- Social media platforms, particularly Telegram, are used for outreach to potential victims.
MITRE Techniques :
- Phishing (T1566) – The Power Parasites scam utilizes deceptive websites and social media to lure victims into providing personal information.
- Abuse Elevation Control Mechanism (T1078) – The campaign leverages brand impersonation to gain trust and exploit victims.
- Credential Dumping (T1003) – Victims are prompted to provide sensitive information, such as bank details and personal identification.
Indicator of Compromise :
- [Domain] sem-energy[.]net
- [Domain] se-renewables[.]info
- [Domain] repsolgain[.]com
- [Domain] onrobotline[.]biz
- [Domain] repsolhub[.]buzz
Full Story: https://www.silentpush.com/blog/power-parasites/