Scammers apparently based in Nigeria have been stealing information from various companies in the oil logistics sector, according to a report published by Panda Security.
The campaign, dubbed “Operation Oil Tanker,” dates as far back as August 2013 and has been monitored by researchers since January 2014.
The security firm discovered the campaign after an employee at an England-based company that handles maritime oil transportation received an email containing a 4 Mb PDF file attached to it. Anti-virus software didn’t flag the document file, but a Panda Security pilot technology detected it as suspicious.
Specially crafted PDF files have been used in numerous attacks. However, in this case, the attacks didn’t involve any actual malware. According to researchers, the PDF, which is a self-extracting archive, contains various legitimate tools and scripts developed by the attackers to steal credentials and other information, and upload it to an FTP server.
On the FTP server that stores the stolen information, researcher discovered a total of 80,000 files containing credentials. After analyzing the files, experts determined that there were 860 unique files holding credentials stolen from roughly ten companies in the oil and gas maritime transportation sector.
“Initially this looked like an average non-targeted attack,” said Luis Corrons, technical director at PandaLabs and author of the report. “Once we dug deeper, though, it became clear that this was a systematic, targeted attack against a number of companies in the same specific industry sector.”
Corrons told SecurityWeek that most of the victims are located in European countries such as Belgium, Germany, Italy, Spain and the UK. A couple of organizations in Singapore and the Chinese city of Shanghai have also been targeted.
After seeing that this was a targeted attack, Panda Security worked on locating the attackers and establishing their motives. Attack attribution is not easy, but experts managed to find useful clues in the information used to register an account on a free service hosting the FTP server.
The email address and the city information used to register the account led investigators to an individual based in Ikeja, a suburb in Lagos, Nigeria’s capital city. The suspect appears to be the owner of a goods transport company, Panda said in its report.
Nigerian scammers are well known all over the world for schemes in which they promise large amounts of money to unsuspecting Internet users. In this case, the individuals behind Operation Oil Tanker seem to be involved in a scam that can be highly profitable.
Nigeria’s Bonny Light crude oil is in high demand by refineries all over the world. Scammers contact oil brokers and offer them a large quantity of Bonny Light oil at an attractive price. The potential buyer is asked to pay between $50,000 and $100,000 in advance to obtain the oil, but for this to happen the fraudsters must produce documents to prove that they are in possession of the product.
Panda Security believes this is the part where the scammers start targeting companies in the oil logistics sector. The documents needed to prove that the oil exists can be forged, but if they manage to get their hands on legitimate papers, the scammers have a better chance of duping the brokers into paying them in advance.
Experts believe that the group behind Operation Oil Tanker doesn’t use the stolen information against the breached companies. Instead, they use it to defraud entities interested in acquiring oil.
Since the stolen information is not used against victims of the hack, these organizations prefer to remain quiet and not report the breach to authorities. This makes it difficult to shut down the malicious operation and bring the perpetrators to justice.
“We can limit the impact of this potentially catastrophic cyber-attack, but only if the victimized companies are willing to come forward,” noted Corrons.

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- UK Car Retailer Arnold Clark Hit by Ransomware
- EV Charging Management System Vulnerabilities Allow Disruption, Energy Theft
- Unpatched Econolite Traffic Controller Vulnerabilities Allow Remote Hacking
- Google Fi Data Breach Reportedly Led to SIM Swapping
- Microsoft’s Verified Publisher Status Abused in Email Theft Campaign
- British Retailer JD Sports Discloses Data Breach Affecting 10 Million Customers
- Meta Awards $27,000 Bounty for 2FA Bypass Vulnerability
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
Latest News
- Google Shells Out $600,000 for OSS-Fuzz Project Integrations
- F5 BIG-IP Vulnerability Can Lead to DoS, Code Execution
- Flaw in Cisco Industrial Appliances Allows Malicious Code to Persist Across Reboots
- UK Car Retailer Arnold Clark Hit by Ransomware
- Dealing With the Carcinization of Security
- HeadCrab Botnet Ensnares 1,200 Redis Servers for Cryptomining
- Cyber Insights 2023 | Supply Chain Security
- Cyber Insights 2023 | Regulations
