Night Dragon hackers smash energy multinationals
Hackers target global energy firms as they seek to gain insider information, McAfee reveals.


The skills and tools used by the hackers were fairly orthodox, according to the report.
Firstly, the attackers used SQL-injection techniques to compromise their target's company extranet web servers, thereby allowing remote command execution.
They then uploaded widely available tools onto the compromised servers, providing access to internal desktops and servers. Password cracking tools let the hackers gain extra usernames and passwords.
By disabling Internet Explorer proxy settings, the infiltrators enabled direct communication from infected machines to the internet, allowing them to exfiltrate emails and other sensitive documents from company executives.
Spear-phishing techniques were also used to gain additional information from company accounts.
Although the hackers used typical techniques, this was not a sign that the energy companies' systems were weak, Day said.
"It's a sign of the complexity of the IT world we work in," he explained.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"A SQL injection is something organisations see every day the challenge is most organisations, especially large ones, have such a breadth of environment and the challenge is being able to stay on top of all of that."
Day said it has become very hard for businesses to remain "100 per cent compliant" given the complexity of the security environment now.
Tom Brewster is currently an associate editor at Forbes and an award-winning journalist who covers cyber security, surveillance, and privacy. Starting his career at ITPro as a staff writer and working up to a senior staff writer role, Tom has been covering the tech industry for more than ten years and is considered one of the leading journalists in his specialism.
He is a proud alum of the University of Sheffield where he secured an undergraduate degree in English Literature before undertaking a certification from General Assembly in web development.
-
Enterprises face delicate balancing act with data center sustainability goals
News High energy consumption, raw material requirements, and physical space constraints are holding back data center sustainability efforts, according to new research from Seagate.
By Emma Woollacott
-
Cleo attack victim list grows as Hertz confirms customer data stolen
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
By Ross Kelly
-
McAfee and Visa offer 50% off antivirus subscriptions for small businesses
News UK Visa Classic Business card holders can access the deal starting today
By Zach Marzouk
-
McAfee Total Protection review: Expensive at full price
Reviews Protects your PC and includes a decent firewall, but costly and less effective than some rivals
By K.G. Orphanides
-
McAfee Total Protection review: Quick, effective and affordable
Reviews A solid security choice, with perfect malware protection, a fully functional VPN and more
By ITPro
-
McAfee’s zero trust solution strengthens private applications’ security
News MVISION Private Access grants secure access to private resources from any device or location
By Praharsha Anand
-
PowerShell threats increased over 200% last year
News A new McAfee report finds PowerShell attacks driven largely by Donoff malware.
By Rene Millman
-
McAfee to sell enterprise business to STG for £2.8 billion
News The enterprise business will be rebranded, with McAfee focusing on personal security
By Daniel Todd
-
Has the US government finally nabbed John McAfee?
News Official Twitter account claims notorious tech tycoon has been “detained by authorities”
By Adam Shepherd
-
John McAfee ordered to pay $25 million over neighbour's murder
News Controversial figure insists that he will not pay
By Adam Shepherd