Inside the 2025 Energy Phishing Wave: Chevron, Conoco, PBF, Phillips 66
In 2025, a significant surge in phishing attacks targeting major U.S. energy companies was observed. The campaign primarily focused on Chevron, ConocoPhillips, PBF Energy, and Phillips 66, utilizing sophisticated impersonation techniques. Attackers employed HTTrack-based cloning to replicate legitimate websites, creating over 1,465 phishing domains. The infrastructure was distributed across multiple hosting providers and countries to evade takedowns. Notably, Chevron faced the highest volume of impersonation attempts with 158 fake domains. The phishing sites combined credential harvesting with investment scam frameworks, enhancing their profitability. Many malicious domains showed low detection rates across security vendors, exposing gaps in current defense systems. The analysis highlights the need for improved threat intelligence integration and faster mitigation strategies in the energy sector.
AI Analysis
Technical Summary
In 2025, a notable phishing campaign targeted major U.S. energy companies including Chevron, ConocoPhillips, PBF Energy, and Phillips 66. The attackers leveraged advanced impersonation techniques by cloning legitimate corporate websites using HTTrack, an open-source website copier. This resulted in the creation of over 1,465 phishing domains designed to mimic authentic energy sector websites. The infrastructure supporting these phishing operations was distributed across multiple hosting providers and countries, complicating takedown efforts and increasing resilience against mitigation. Chevron was the most heavily targeted brand, with 158 fake domains impersonating its online presence. The phishing sites combined credential harvesting mechanisms with investment scam frameworks, aiming to steal sensitive login information and defraud victims through fraudulent investment schemes. Many of these malicious domains exhibited low detection rates by security vendors, highlighting significant gaps in current anti-phishing defenses and threat intelligence sharing. The campaign utilized various tactics, techniques, and procedures (TTPs) mapped to MITRE ATT&CK techniques such as domain impersonation (T1583.001), credential harvesting (T1589.002), and user execution (T1204.001). The sophistication and scale of this campaign underscore the need for enhanced threat intelligence integration, rapid detection, and coordinated mitigation strategies within the energy sector to protect critical infrastructure and personnel from credential compromise and financial fraud.
Potential Impact
For European organizations, especially those in the energy sector or with business ties to U.S. energy firms, this phishing wave poses a significant risk. Credential harvesting can lead to unauthorized access to corporate networks, potentially exposing sensitive operational data or enabling further lateral movement within critical infrastructure environments. The combination with investment scams also threatens employees and stakeholders financially, potentially undermining trust and causing reputational damage. Given the distributed hosting and low detection rates, European companies may face challenges in timely identifying and blocking these phishing domains. Additionally, if European energy firms use similar branding or have partnerships with the targeted U.S. companies, they may become collateral targets or face spillover effects. The campaign’s scale and sophistication could also inspire similar attacks targeting European energy companies, increasing the overall threat landscape in the region.
Mitigation Recommendations
European organizations should implement multi-layered anti-phishing defenses beyond standard email filtering. This includes deploying advanced domain monitoring solutions to detect and take down impersonating domains rapidly, leveraging threat intelligence feeds that specifically track energy sector phishing campaigns. User awareness training should be tailored to recognize sophisticated website cloning and investment scam tactics. Implementing strong multi-factor authentication (MFA) can reduce the risk of compromised credentials leading to unauthorized access. Organizations should also conduct regular phishing simulation exercises to test employee readiness. Collaboration with industry information sharing and analysis centers (ISACs), such as the European Energy ISAC, can improve threat intelligence sharing and coordinated response. Network defenders should monitor for indicators of compromise related to credential harvesting and investment scam activity, including unusual login patterns or financial transactions. Finally, legal and takedown teams should be prepared to act swiftly against malicious domains hosted across multiple jurisdictions.
Affected Countries
United Kingdom, Germany, France, Netherlands, Belgium, Italy, Spain, Poland
Indicators of Compromise
- hash: 6296ae44fae279994f4b127bd08db3e1
- ip: 162.0.232.186
- ip: 198.187.29.69
- ip: 66.29.153.204
- ip: 68.65.122.137
- ip: 68.65.122.139
- ip: 68.65.122.141
- ip: 68.65.122.142
- url: http://cclresources.com/
- url: http://chevroncorpstocks.com/
- url: http://conocophillips.live/
- url: http://conocophillips.live/app/index.html
- url: http://conocophils.com/index.html
- url: http://conocophils.com/operations/index.html
- url: http://pbfenergy.cc/
- url: http://pbfenergy.cc/.
- url: http://phillips66shop.com/
- url: https://conocophils.com/register
- url: https://investors.pbfenergy.com/
- url: https://phillips66-carros.site/
- url: https://phillips66-carros.site/.
- url: https://phillips66lubricants.ru/
- url: https://www.pbfenergy.com/
- domain: advancedownloads.com
- domain: cclresources.com
- domain: chevroncorpstocks.com
- domain: chevroncvxstocks.com
- domain: conocophillips.live
- domain: conocophils.com
- domain: humanenergy-company.com
- domain: malware.name
- domain: orangeoffers.click
- domain: pbfenergy.cc
- domain: phillips66-carros.site
- domain: phillips66lubricants.ru
- domain: phillips66shop.com
- domain: wwwmyphillips66card.com
- domain: xn--conocopillips-2z0g.com
- domain: conoco-2024.dev.fastspot.com
- domain: humanenergy-company.com.cargoxpressdelivery.com
- domain: investors.pbfenergy.com
- domain: www.humanenergy-company.com
- domain: www.humanenergy-company.com.cargoxpressdelivery.com
- domain: www.pbfenergy.com
Inside the 2025 Energy Phishing Wave: Chevron, Conoco, PBF, Phillips 66
Description
In 2025, a significant surge in phishing attacks targeting major U.S. energy companies was observed. The campaign primarily focused on Chevron, ConocoPhillips, PBF Energy, and Phillips 66, utilizing sophisticated impersonation techniques. Attackers employed HTTrack-based cloning to replicate legitimate websites, creating over 1,465 phishing domains. The infrastructure was distributed across multiple hosting providers and countries to evade takedowns. Notably, Chevron faced the highest volume of impersonation attempts with 158 fake domains. The phishing sites combined credential harvesting with investment scam frameworks, enhancing their profitability. Many malicious domains showed low detection rates across security vendors, exposing gaps in current defense systems. The analysis highlights the need for improved threat intelligence integration and faster mitigation strategies in the energy sector.
AI-Powered Analysis
Technical Analysis
In 2025, a notable phishing campaign targeted major U.S. energy companies including Chevron, ConocoPhillips, PBF Energy, and Phillips 66. The attackers leveraged advanced impersonation techniques by cloning legitimate corporate websites using HTTrack, an open-source website copier. This resulted in the creation of over 1,465 phishing domains designed to mimic authentic energy sector websites. The infrastructure supporting these phishing operations was distributed across multiple hosting providers and countries, complicating takedown efforts and increasing resilience against mitigation. Chevron was the most heavily targeted brand, with 158 fake domains impersonating its online presence. The phishing sites combined credential harvesting mechanisms with investment scam frameworks, aiming to steal sensitive login information and defraud victims through fraudulent investment schemes. Many of these malicious domains exhibited low detection rates by security vendors, highlighting significant gaps in current anti-phishing defenses and threat intelligence sharing. The campaign utilized various tactics, techniques, and procedures (TTPs) mapped to MITRE ATT&CK techniques such as domain impersonation (T1583.001), credential harvesting (T1589.002), and user execution (T1204.001). The sophistication and scale of this campaign underscore the need for enhanced threat intelligence integration, rapid detection, and coordinated mitigation strategies within the energy sector to protect critical infrastructure and personnel from credential compromise and financial fraud.
Potential Impact
For European organizations, especially those in the energy sector or with business ties to U.S. energy firms, this phishing wave poses a significant risk. Credential harvesting can lead to unauthorized access to corporate networks, potentially exposing sensitive operational data or enabling further lateral movement within critical infrastructure environments. The combination with investment scams also threatens employees and stakeholders financially, potentially undermining trust and causing reputational damage. Given the distributed hosting and low detection rates, European companies may face challenges in timely identifying and blocking these phishing domains. Additionally, if European energy firms use similar branding or have partnerships with the targeted U.S. companies, they may become collateral targets or face spillover effects. The campaign’s scale and sophistication could also inspire similar attacks targeting European energy companies, increasing the overall threat landscape in the region.
Mitigation Recommendations
European organizations should implement multi-layered anti-phishing defenses beyond standard email filtering. This includes deploying advanced domain monitoring solutions to detect and take down impersonating domains rapidly, leveraging threat intelligence feeds that specifically track energy sector phishing campaigns. User awareness training should be tailored to recognize sophisticated website cloning and investment scam tactics. Implementing strong multi-factor authentication (MFA) can reduce the risk of compromised credentials leading to unauthorized access. Organizations should also conduct regular phishing simulation exercises to test employee readiness. Collaboration with industry information sharing and analysis centers (ISACs), such as the European Energy ISAC, can improve threat intelligence sharing and coordinated response. Network defenders should monitor for indicators of compromise related to credential harvesting and investment scam activity, including unusual login patterns or financial transactions. Finally, legal and takedown teams should be prepared to act swiftly against malicious domains hosted across multiple jurisdictions.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://hunt.io/blog/us-energy-phishing-wave-report"]
- Adversary
- null
- Pulse Id
- 68c37a4f61a4eeb53a76aef0
- Threat Score
- null
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash6296ae44fae279994f4b127bd08db3e1 | — |
Ip
Value | Description | Copy |
---|---|---|
ip162.0.232.186 | — | |
ip198.187.29.69 | — | |
ip66.29.153.204 | — | |
ip68.65.122.137 | — | |
ip68.65.122.139 | — | |
ip68.65.122.141 | — | |
ip68.65.122.142 | — |
Url
Value | Description | Copy |
---|---|---|
urlhttp://cclresources.com/ | — | |
urlhttp://chevroncorpstocks.com/ | — | |
urlhttp://conocophillips.live/ | — | |
urlhttp://conocophillips.live/app/index.html | — | |
urlhttp://conocophils.com/index.html | — | |
urlhttp://conocophils.com/operations/index.html | — | |
urlhttp://pbfenergy.cc/ | — | |
urlhttp://pbfenergy.cc/. | — | |
urlhttp://phillips66shop.com/ | — | |
urlhttps://conocophils.com/register | — | |
urlhttps://investors.pbfenergy.com/ | — | |
urlhttps://phillips66-carros.site/ | — | |
urlhttps://phillips66-carros.site/. | — | |
urlhttps://phillips66lubricants.ru/ | — | |
urlhttps://www.pbfenergy.com/ | — |
Domain
Value | Description | Copy |
---|---|---|
domainadvancedownloads.com | — | |
domaincclresources.com | — | |
domainchevroncorpstocks.com | — | |
domainchevroncvxstocks.com | — | |
domainconocophillips.live | — | |
domainconocophils.com | — | |
domainhumanenergy-company.com | — | |
domainmalware.name | — | |
domainorangeoffers.click | — | |
domainpbfenergy.cc | — | |
domainphillips66-carros.site | — | |
domainphillips66lubricants.ru | — | |
domainphillips66shop.com | — | |
domainwwwmyphillips66card.com | — | |
domainxn--conocopillips-2z0g.com | — | |
domainconoco-2024.dev.fastspot.com | — | |
domainhumanenergy-company.com.cargoxpressdelivery.com | — | |
domaininvestors.pbfenergy.com | — | |
domainwww.humanenergy-company.com | — | |
domainwww.humanenergy-company.com.cargoxpressdelivery.com | — | |
domainwww.pbfenergy.com | — |
Threat ID: 68c3d71f1f88449e6f032ee4
Added to database: 9/12/2025, 8:17:35 AM
Last enriched: 9/12/2025, 8:17:56 AM
Last updated: 9/12/2025, 7:18:18 PM
Views: 5
Related Threats
Yurei the New Ransomware Group on the Scene
MediumDeconstructing a Cyber Deception: An Analysis of the Clickfix HijackLoader Phishing Campaign
MediumSEO Poisoning Attack Hits Windows Users With Hiddengh0st and Winos Malware
MediumMuck Stealer Malware Used Alongside Phishing in New Attack Waves
MediumApple issues spyware warnings as CERT-FR confirms attacks
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.