Libyan Oil Refinery Among Targets in Long-running Likely Espionage Campaign
A series of attacks targeting Libyan organizations, including an oil refinery, a telecoms organization, and a state institution, occurred between November 2025 and February 2026. The campaign utilized the AsyncRAT backdoor, delivered through spear-phishing emails with Libya-themed lure documents. The attackers exploited current events, such as the assassination of Saif al-Gaddafi, to gain access to networks. The modular nature of AsyncRAT and the targeted organizations suggest possible state sponsorship. The campaign's focus on Libya and its oil industry is notable, given the country's increased oil production and global energy supply concerns amidst Middle East conflicts.
AI Analysis
Technical Summary
This espionage campaign, active from late 2025 to early 2026, targeted key Libyan organizations such as an oil refinery, a telecommunications company, and a government institution. The attackers used spear-phishing emails containing Libya-themed lure documents that exploited the assassination of Saif al-Gaddafi to increase the likelihood of user interaction. The payload delivered was AsyncRAT, a modular remote access trojan (RAT) capable of executing a wide range of malicious activities including credential theft, process injection, persistence, and data exfiltration. The campaign employed multiple MITRE ATT&CK techniques such as T1053.005 (Scheduled Task/Job), T1113 (Screen Capture), T1056.001 (Credential Dumping), T1204.002 (User Execution: Malicious File), T1055 (Process Injection), T1036.002 (Masquerading), T1059.001 (Command and Scripting Interpreter), T1547.001 (Registry Run Keys/Startup Folder), T1566 (Phishing), T1078 (Valid Accounts), T1027 (Obfuscated Files or Information), and T1105 (Ingress Tool Transfer). The modular nature of AsyncRAT allows attackers to customize capabilities based on objectives, indicating a sophisticated and adaptable threat actor, likely state-sponsored given the strategic nature of targets and geopolitical context. The campaign’s focus on Libya’s oil sector aligns with the country’s increased oil production and its importance in global energy markets amid Middle East conflicts. No public exploits or widespread infections have been reported, but the targeted nature and use of current events for social engineering highlight the threat’s sophistication and persistence.
Potential Impact
The campaign poses a significant espionage threat to Libya’s critical infrastructure, particularly its oil production facilities, which are vital to both the national economy and global energy supply. Successful intrusions could lead to unauthorized access to sensitive operational data, disruption of refinery operations, and compromise of telecommunications networks that support critical communications. The theft of credentials and persistent backdoor access could enable long-term surveillance, data exfiltration, and potential sabotage. While no destructive payloads have been reported, the presence of a backdoor like AsyncRAT increases the risk of future escalations or lateral movement within networks. The geopolitical sensitivity of Libya’s energy sector means that such espionage could have broader implications, including influencing energy markets and regional stability. Organizations worldwide involved in energy supply chains or with business ties to Libya may also face indirect risks from data compromise or supply disruptions.
Mitigation Recommendations
Organizations should implement targeted defenses against spear-phishing, including user training focused on recognizing politically themed lures and current event exploitation. Deploy advanced email filtering and sandboxing to detect and block malicious attachments and links. Monitor for indicators of AsyncRAT activity, such as unusual scheduled tasks, registry run keys, and process injection behaviors. Employ endpoint detection and response (EDR) solutions capable of identifying obfuscated files and command interpreter misuse. Enforce strict credential hygiene, including multi-factor authentication and regular credential audits, to mitigate credential dumping and reuse. Network segmentation should isolate critical operational technology (OT) environments from corporate IT networks to limit lateral movement. Incident response plans must include procedures for detecting and eradicating backdoors and for forensic analysis of spear-phishing campaigns. Given the modularity of AsyncRAT, continuous threat hunting for novel command and control patterns is recommended. Collaboration with regional cybersecurity authorities and sharing of threat intelligence can enhance detection and response capabilities.
Affected Countries
Libya, United Arab Emirates, Saudi Arabia, Egypt, Turkey, United States, United Kingdom, France, Italy
Indicators of Compromise
- hash: 15b687cb6ddf56f671fb6bd750604177
- hash: 5e9d7d9316383efc8743675298710ef0
- hash: 7300ba0879ceb382192ba8d93ff7a792
- hash: 9bf88267166d2b6244a4bdcc9d02113f
- hash: c6e0019a4aadbc97837839216ad882ee
- hash: e87764252a333ba316e89f24be05d7c0
- hash: e8871849dfdaf6b6cd9233f70c4c7493
- hash: 0338ed21dc6555c6814b5bf77ff71bf68ce57ede
- hash: 087ba76c2497d67e35c6530ce90841e1b8cf2cf9
- hash: 49e00c0f781703ae2803ac0fa7e8d6dddd924aee
- hash: 74bf4daa98a4808c122c1f649ca0e88f70d64802
- hash: bc5cba6bbb5c724c0d49c6985948b6907d514aa7
- hash: c81327abaaa06961a308af0eae5f73e482e00bd8
- hash: dbcce5ebd953c077be8dcd0f002258aa53153b7e
- hash: 0499152c6dd775491ce099eee4c382a94f72c07031081db164de921effa9664f
- hash: 0f3344e672d1ea6cde382b68b27063ed766fced717e9f5f2e15e6c79ce0737f7
- hash: 12c65ac4e02313ed1aa2d32d56428f0a135b281604d536e5ae6ca08b6b4232c9
- hash: 1d32f451d18c3dc8dbf00cd7df1200f83efa27cbaddeb9b2bed726e6d08ef5b1
- hash: 22a1cf91fbac104e2dd374dd06e93488cfdf216890088ef18318d90f440f00f6
- hash: 3101cc378db2665eb2969b62e28efb9bfd5ca6f9bd3ebc27b422d5a29bfd1b17
- hash: 34ae832427b03df5f8cb90e78b5b174665c19602575b37fc7cad8100978898d2
- hash: 39eade26c5680d20f5a8032a0d3996a29058e52c147e4b49a2072d2dcb353325
- hash: 3ca93362559db4da9d44d614345cbdfdb81d882367af05651bb718e1cc57ab08
- hash: 3d5ada3b035e2adc8de1db24ab9d8e0e828eec1b7601ed9d064b41fa9d026a34
- hash: 43c5d9a267742ee3c6c9bcf3e6f63ec397fbe0233a5d99bdb7dacbfa1a0f69d5
- hash: 5b573743306a2324608fdbd9c5cceba6bd5abfaccd1ea8b94c60f73da279e636
- hash: 85e01e36b7b2b90af79642732a17dd566af0b10a85fd8a4cc85ea11583a0ff00
- hash: 946ae65e508acb4dbf6b29432889511a76636453cc04256230fbce25cef86b6a
- hash: 9843874eb6217a79ba5a51a6a886745169b1a1ad43f7ae12de6e610324e88ab7
- hash: ad4e27fe06fae2325faa2a00be7b41f40aa9c63fe79713597b3330ad7e583ca8
- hash: ad796fc0ac17b58e47dbadd42bf164790c18ac67aade8c6bf2251056ef68138d
- hash: b4a3f2f5091df7174e82283ed59cd557eea2e8ddd7a018dafc5e8151fd683429
- hash: c03120163d9401d66d482899421d9dd68db63d34bac2b32e3090e8ad0b911d83
- hash: c2a2c2b26b235bad31a352e1fd475794167ec79928c52d98bccb3607e932c7b2
- hash: c3eef096073dd0873a821c35dd2e7eaf391863264ab72e1b91f2ca73218c2d04
- hash: cd7e16ca636f6e5cb86cd41561d57620a131a26b53c6e25a36edcbbcb2b5276a
- hash: d884a17046bbefd73f76f88533e1f2da40d5233b15caa48245de65d2c19c50dc
- hash: eb76f0797c27821635992ef23a570fe3a11c848998bc9f7735e968adc6b2f33c
- hash: ece81cdc6fc12a07a984b98df58e34c92998cdd957e1f45cabd925056bb0f92e
- hash: f307f8fa89b9f9eb8c2ae346055dffb80c93f56034aa3abe7a8a25d6e5e680c6
- hash: f8b5a5429fb1da677ab8c09fc95b26e3b3d8bcd27521a56cc835fbf5878dbcd8
- hash: f8d2c5cb898cf92495fdcb7e20f509603e1bdd62ba4b61bd7694a8e33a4c738f
- url: https://hs8.krakenfiles.com/uploads/15-02-2026/JCaF7rrPQm/image.png.
- domain: hs8.krakenfiles.com
Libyan Oil Refinery Among Targets in Long-running Likely Espionage Campaign
Description
A series of attacks targeting Libyan organizations, including an oil refinery, a telecoms organization, and a state institution, occurred between November 2025 and February 2026. The campaign utilized the AsyncRAT backdoor, delivered through spear-phishing emails with Libya-themed lure documents. The attackers exploited current events, such as the assassination of Saif al-Gaddafi, to gain access to networks. The modular nature of AsyncRAT and the targeted organizations suggest possible state sponsorship. The campaign's focus on Libya and its oil industry is notable, given the country's increased oil production and global energy supply concerns amidst Middle East conflicts.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This espionage campaign, active from late 2025 to early 2026, targeted key Libyan organizations such as an oil refinery, a telecommunications company, and a government institution. The attackers used spear-phishing emails containing Libya-themed lure documents that exploited the assassination of Saif al-Gaddafi to increase the likelihood of user interaction. The payload delivered was AsyncRAT, a modular remote access trojan (RAT) capable of executing a wide range of malicious activities including credential theft, process injection, persistence, and data exfiltration. The campaign employed multiple MITRE ATT&CK techniques such as T1053.005 (Scheduled Task/Job), T1113 (Screen Capture), T1056.001 (Credential Dumping), T1204.002 (User Execution: Malicious File), T1055 (Process Injection), T1036.002 (Masquerading), T1059.001 (Command and Scripting Interpreter), T1547.001 (Registry Run Keys/Startup Folder), T1566 (Phishing), T1078 (Valid Accounts), T1027 (Obfuscated Files or Information), and T1105 (Ingress Tool Transfer). The modular nature of AsyncRAT allows attackers to customize capabilities based on objectives, indicating a sophisticated and adaptable threat actor, likely state-sponsored given the strategic nature of targets and geopolitical context. The campaign’s focus on Libya’s oil sector aligns with the country’s increased oil production and its importance in global energy markets amid Middle East conflicts. No public exploits or widespread infections have been reported, but the targeted nature and use of current events for social engineering highlight the threat’s sophistication and persistence.
Potential Impact
The campaign poses a significant espionage threat to Libya’s critical infrastructure, particularly its oil production facilities, which are vital to both the national economy and global energy supply. Successful intrusions could lead to unauthorized access to sensitive operational data, disruption of refinery operations, and compromise of telecommunications networks that support critical communications. The theft of credentials and persistent backdoor access could enable long-term surveillance, data exfiltration, and potential sabotage. While no destructive payloads have been reported, the presence of a backdoor like AsyncRAT increases the risk of future escalations or lateral movement within networks. The geopolitical sensitivity of Libya’s energy sector means that such espionage could have broader implications, including influencing energy markets and regional stability. Organizations worldwide involved in energy supply chains or with business ties to Libya may also face indirect risks from data compromise or supply disruptions.
Mitigation Recommendations
Organizations should implement targeted defenses against spear-phishing, including user training focused on recognizing politically themed lures and current event exploitation. Deploy advanced email filtering and sandboxing to detect and block malicious attachments and links. Monitor for indicators of AsyncRAT activity, such as unusual scheduled tasks, registry run keys, and process injection behaviors. Employ endpoint detection and response (EDR) solutions capable of identifying obfuscated files and command interpreter misuse. Enforce strict credential hygiene, including multi-factor authentication and regular credential audits, to mitigate credential dumping and reuse. Network segmentation should isolate critical operational technology (OT) environments from corporate IT networks to limit lateral movement. Incident response plans must include procedures for detecting and eradicating backdoors and for forensic analysis of spear-phishing campaigns. Given the modularity of AsyncRAT, continuous threat hunting for novel command and control patterns is recommended. Collaboration with regional cybersecurity authorities and sharing of threat intelligence can enhance detection and response capabilities.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.security.com/blog-post/asyncrat-libya-oil-cyberattack"]
- Adversary
- null
- Pulse Id
- 69bdb8e4c95a097d1f31606a
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash15b687cb6ddf56f671fb6bd750604177 | — | |
hash5e9d7d9316383efc8743675298710ef0 | — | |
hash7300ba0879ceb382192ba8d93ff7a792 | — | |
hash9bf88267166d2b6244a4bdcc9d02113f | — | |
hashc6e0019a4aadbc97837839216ad882ee | — | |
hashe87764252a333ba316e89f24be05d7c0 | — | |
hashe8871849dfdaf6b6cd9233f70c4c7493 | — | |
hash0338ed21dc6555c6814b5bf77ff71bf68ce57ede | — | |
hash087ba76c2497d67e35c6530ce90841e1b8cf2cf9 | — | |
hash49e00c0f781703ae2803ac0fa7e8d6dddd924aee | — | |
hash74bf4daa98a4808c122c1f649ca0e88f70d64802 | — | |
hashbc5cba6bbb5c724c0d49c6985948b6907d514aa7 | — | |
hashc81327abaaa06961a308af0eae5f73e482e00bd8 | — | |
hashdbcce5ebd953c077be8dcd0f002258aa53153b7e | — | |
hash0499152c6dd775491ce099eee4c382a94f72c07031081db164de921effa9664f | — | |
hash0f3344e672d1ea6cde382b68b27063ed766fced717e9f5f2e15e6c79ce0737f7 | — | |
hash12c65ac4e02313ed1aa2d32d56428f0a135b281604d536e5ae6ca08b6b4232c9 | — | |
hash1d32f451d18c3dc8dbf00cd7df1200f83efa27cbaddeb9b2bed726e6d08ef5b1 | — | |
hash22a1cf91fbac104e2dd374dd06e93488cfdf216890088ef18318d90f440f00f6 | — | |
hash3101cc378db2665eb2969b62e28efb9bfd5ca6f9bd3ebc27b422d5a29bfd1b17 | — | |
hash34ae832427b03df5f8cb90e78b5b174665c19602575b37fc7cad8100978898d2 | — | |
hash39eade26c5680d20f5a8032a0d3996a29058e52c147e4b49a2072d2dcb353325 | — | |
hash3ca93362559db4da9d44d614345cbdfdb81d882367af05651bb718e1cc57ab08 | — | |
hash3d5ada3b035e2adc8de1db24ab9d8e0e828eec1b7601ed9d064b41fa9d026a34 | — | |
hash43c5d9a267742ee3c6c9bcf3e6f63ec397fbe0233a5d99bdb7dacbfa1a0f69d5 | — | |
hash5b573743306a2324608fdbd9c5cceba6bd5abfaccd1ea8b94c60f73da279e636 | — | |
hash85e01e36b7b2b90af79642732a17dd566af0b10a85fd8a4cc85ea11583a0ff00 | — | |
hash946ae65e508acb4dbf6b29432889511a76636453cc04256230fbce25cef86b6a | — | |
hash9843874eb6217a79ba5a51a6a886745169b1a1ad43f7ae12de6e610324e88ab7 | — | |
hashad4e27fe06fae2325faa2a00be7b41f40aa9c63fe79713597b3330ad7e583ca8 | — | |
hashad796fc0ac17b58e47dbadd42bf164790c18ac67aade8c6bf2251056ef68138d | — | |
hashb4a3f2f5091df7174e82283ed59cd557eea2e8ddd7a018dafc5e8151fd683429 | — | |
hashc03120163d9401d66d482899421d9dd68db63d34bac2b32e3090e8ad0b911d83 | — | |
hashc2a2c2b26b235bad31a352e1fd475794167ec79928c52d98bccb3607e932c7b2 | — | |
hashc3eef096073dd0873a821c35dd2e7eaf391863264ab72e1b91f2ca73218c2d04 | — | |
hashcd7e16ca636f6e5cb86cd41561d57620a131a26b53c6e25a36edcbbcb2b5276a | — | |
hashd884a17046bbefd73f76f88533e1f2da40d5233b15caa48245de65d2c19c50dc | — | |
hasheb76f0797c27821635992ef23a570fe3a11c848998bc9f7735e968adc6b2f33c | — | |
hashece81cdc6fc12a07a984b98df58e34c92998cdd957e1f45cabd925056bb0f92e | — | |
hashf307f8fa89b9f9eb8c2ae346055dffb80c93f56034aa3abe7a8a25d6e5e680c6 | — | |
hashf8b5a5429fb1da677ab8c09fc95b26e3b3d8bcd27521a56cc835fbf5878dbcd8 | — | |
hashf8d2c5cb898cf92495fdcb7e20f509603e1bdd62ba4b61bd7694a8e33a4c738f | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttps://hs8.krakenfiles.com/uploads/15-02-2026/JCaF7rrPQm/image.png. | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainhs8.krakenfiles.com | — |
Threat ID: 69c10bcff4197a8e3b33b84f
Added to database: 3/23/2026, 9:45:51 AM
Last enriched: 3/23/2026, 10:01:31 AM
Last updated: 3/24/2026, 5:38:25 AM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.