Skip to main content

Inside the 2025 Energy Phishing Wave: Chevron, Conoco, PBF, Phillips 66

Medium
Published: Fri Sep 12 2025 (09/12/2025, 01:41:35 UTC)
Source: AlienVault OTX General

Description

In 2025, a significant surge in phishing attacks targeting major U.S. energy companies was observed. The campaign primarily focused on Chevron, ConocoPhillips, PBF Energy, and Phillips 66, utilizing sophisticated impersonation techniques. Attackers employed HTTrack-based cloning to replicate legitimate websites, creating over 1,465 phishing domains. The infrastructure was distributed across multiple hosting providers and countries to evade takedowns. Notably, Chevron faced the highest volume of impersonation attempts with 158 fake domains. The phishing sites combined credential harvesting with investment scam frameworks, enhancing their profitability. Many malicious domains showed low detection rates across security vendors, exposing gaps in current defense systems. The analysis highlights the need for improved threat intelligence integration and faster mitigation strategies in the energy sector.

AI-Powered Analysis

AILast updated: 09/12/2025, 08:17:56 UTC

Technical Analysis

In 2025, a notable phishing campaign targeted major U.S. energy companies including Chevron, ConocoPhillips, PBF Energy, and Phillips 66. The attackers leveraged advanced impersonation techniques by cloning legitimate corporate websites using HTTrack, an open-source website copier. This resulted in the creation of over 1,465 phishing domains designed to mimic authentic energy sector websites. The infrastructure supporting these phishing operations was distributed across multiple hosting providers and countries, complicating takedown efforts and increasing resilience against mitigation. Chevron was the most heavily targeted brand, with 158 fake domains impersonating its online presence. The phishing sites combined credential harvesting mechanisms with investment scam frameworks, aiming to steal sensitive login information and defraud victims through fraudulent investment schemes. Many of these malicious domains exhibited low detection rates by security vendors, highlighting significant gaps in current anti-phishing defenses and threat intelligence sharing. The campaign utilized various tactics, techniques, and procedures (TTPs) mapped to MITRE ATT&CK techniques such as domain impersonation (T1583.001), credential harvesting (T1589.002), and user execution (T1204.001). The sophistication and scale of this campaign underscore the need for enhanced threat intelligence integration, rapid detection, and coordinated mitigation strategies within the energy sector to protect critical infrastructure and personnel from credential compromise and financial fraud.

Potential Impact

For European organizations, especially those in the energy sector or with business ties to U.S. energy firms, this phishing wave poses a significant risk. Credential harvesting can lead to unauthorized access to corporate networks, potentially exposing sensitive operational data or enabling further lateral movement within critical infrastructure environments. The combination with investment scams also threatens employees and stakeholders financially, potentially undermining trust and causing reputational damage. Given the distributed hosting and low detection rates, European companies may face challenges in timely identifying and blocking these phishing domains. Additionally, if European energy firms use similar branding or have partnerships with the targeted U.S. companies, they may become collateral targets or face spillover effects. The campaign’s scale and sophistication could also inspire similar attacks targeting European energy companies, increasing the overall threat landscape in the region.

Mitigation Recommendations

European organizations should implement multi-layered anti-phishing defenses beyond standard email filtering. This includes deploying advanced domain monitoring solutions to detect and take down impersonating domains rapidly, leveraging threat intelligence feeds that specifically track energy sector phishing campaigns. User awareness training should be tailored to recognize sophisticated website cloning and investment scam tactics. Implementing strong multi-factor authentication (MFA) can reduce the risk of compromised credentials leading to unauthorized access. Organizations should also conduct regular phishing simulation exercises to test employee readiness. Collaboration with industry information sharing and analysis centers (ISACs), such as the European Energy ISAC, can improve threat intelligence sharing and coordinated response. Network defenders should monitor for indicators of compromise related to credential harvesting and investment scam activity, including unusual login patterns or financial transactions. Finally, legal and takedown teams should be prepared to act swiftly against malicious domains hosted across multiple jurisdictions.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://hunt.io/blog/us-energy-phishing-wave-report"]
Adversary
null
Pulse Id
68c37a4f61a4eeb53a76aef0
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash6296ae44fae279994f4b127bd08db3e1

Ip

ValueDescriptionCopy
ip162.0.232.186
ip198.187.29.69
ip66.29.153.204
ip68.65.122.137
ip68.65.122.139
ip68.65.122.141
ip68.65.122.142

Url

ValueDescriptionCopy
urlhttp://cclresources.com/
urlhttp://chevroncorpstocks.com/
urlhttp://conocophillips.live/
urlhttp://conocophillips.live/app/index.html
urlhttp://conocophils.com/index.html
urlhttp://conocophils.com/operations/index.html
urlhttp://pbfenergy.cc/
urlhttp://pbfenergy.cc/.
urlhttp://phillips66shop.com/
urlhttps://conocophils.com/register
urlhttps://investors.pbfenergy.com/
urlhttps://phillips66-carros.site/
urlhttps://phillips66-carros.site/.
urlhttps://phillips66lubricants.ru/
urlhttps://www.pbfenergy.com/

Domain

ValueDescriptionCopy
domainadvancedownloads.com
domaincclresources.com
domainchevroncorpstocks.com
domainchevroncvxstocks.com
domainconocophillips.live
domainconocophils.com
domainhumanenergy-company.com
domainmalware.name
domainorangeoffers.click
domainpbfenergy.cc
domainphillips66-carros.site
domainphillips66lubricants.ru
domainphillips66shop.com
domainwwwmyphillips66card.com
domainxn--conocopillips-2z0g.com
domainconoco-2024.dev.fastspot.com
domainhumanenergy-company.com.cargoxpressdelivery.com
domaininvestors.pbfenergy.com
domainwww.humanenergy-company.com
domainwww.humanenergy-company.com.cargoxpressdelivery.com
domainwww.pbfenergy.com

Threat ID: 68c3d71f1f88449e6f032ee4

Added to database: 9/12/2025, 8:17:35 AM

Last enriched: 9/12/2025, 8:17:56 AM

Last updated: 9/12/2025, 7:18:18 PM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats