Tecnimont Cyber Theft – Security Advisory

 

Background:

Maire Tecnimont SpA is the parent company of the Italian group Maire Tecnimont, which consists of at least 50 operating companies in the engineering and main contracting sector. It deals in oil and gas, chemicals and petrochemicals, energy, infrastructure and civil engineering.

This document is about a security incident of Tecnimont Cyber Theft wherein a Chinese group swindled US$18.5m from an Indian arm of Italian firm on 10 January 2019.

 

Financial Loss:

USD $18.6 million / INR 130 Crore

 

How it Happened?

Figure: Anatomy of Attack

 

Type of Attacks Involved:

  1. Phishing
  2. Cyber Theft
  3. Identity Theft
  4. Social Engineering
  5. Malware Attack

 

Prime Target:

Indian head of Tecnimont SpA

 

Attack Scenario:

  • The Chinese attackers sent emails to the head of Tecnimont Pvt. Ltd., the Indian subsidiary of Milan-headquartered Tecnimont SpA, through an email account that looked deceptively similar to that of group CEO.
  • The email’s wording imitated the writing style of the group chairman. Other communications that purported to come from various executives were similar in nature as the hackers might have managed to penetrate the IT system and study their emails.
  • The hackers then arranged a series of conference calls to discuss a possible “secretive” and “highly confidential” acquisition in China. Several people played various roles during these calls, pretending to be the group CEO, a top Switzerland-based lawyer and other senior executives of the company. § The attackers have convinced India CEO to send money for a secret acquisition happening in china.
  • The hackers convinced that the money couldn’t be transferred from Italy due to regulatory issues.
  • After that the CEO has transferred the amount in three tranches during one week in November. The money that was transferred — $5.6 million, $9.4 million and $3.6 million — from India to the banks in Hong Kong was withdrawn within minutes. The fraudsters tried for a fourth transfer, but by then the fraud had been discovered.

 

Observations:

  • Attackers masked their Email addresses.
  • Email harvesting done to identify emails of executive officers.
  • Used similar domains which made the phishing emails seem legitimate. § All people in conference call had fraudulent ID’s.
  • The bank account which they have used to transfer the amounts were opened using fake documents confirmed by the investigators.
  • The publication reported citing internal examinations that all those on conference calls had sham identities and the top Swiss lawyer who went by the name of Luigi Corradi doesn’t exist. The bank accounts into which the money was sent were opened using bogus documents.
  • The attack was carried out using Social Engineering + Phishing Emails Attack.

 

Recommendations:

With respective to this attack below are the recommendations that need to follow:

  • Do not respond to unknown and/or suspicious emails
  • Conduct phishing diagnostic (red team attack) & social engineering attack to identify overall organization’s security posture
  • User security awareness training is required
  • Periodically update the security patches and antivirus signatures
  • Continuous security monitoring of critical network with securely configured solutions
  • Use two factor authentications to authenticate into the emails and critical application as well as systems account.
  • Secure network architecture deployment across main office to plants.

 

Author,

Jinto T.K.
SOC Team
Varutra Consulting Pvt. Ltd
kalpadmin

Recent Posts

Complete Guide to SQL Injection Vulnerabilities: How to Protect Your Applications

Introduction In the era of digitalization, data security has become a paramount concern. Every day,…

1 week ago

Bluetooth Vulnerability: Implications and Mitigations for Android, macOS, iOS, and Linux Devices

I.Introduction Bluetooth has become an integral technology for billions of smartphones, computers, wearables, and other…

2 weeks ago

The MITRE ATT&CK Framework and SOAR: A Dynamic Duo in Cybersecurity

I. Introduction In today's ever-evolving cybersecurity landscape, staying ahead of adversaries has become a challenge.…

1 month ago

The Benefits of SEBI Security Audit and Governance: Safeguarding Investors’ Interests

Introduction In an increasingly interconnected world, the financial industry is becoming more vulnerable to cyber…

2 months ago

Root Detection Bypass Vulnerabilities: A Crucial Aspect of Mobile App Security

Introduction In today's interconnected world, where smartphones are an extension of our lives, ensuring the…

7 months ago

How to Detect & Mitigate Zero-Day Threats in Your Business Infrastructure?

Introduction Unseen and unpredictable, zero-day threats loom as a constant menace to modern businesses. Detecting…

8 months ago