<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p>The <strong>OilRig Campaign</strong>, so named by PaloAlto Networks because the Persian word for oily—“nafti”—was hardcoded into a number of malware samples analyzed, consists of two attack waves against Saudi Arabian organizations beginning in late 2015. This campaign has been seen targeting financial institutions and technology organizations, as well as the defense industry. The malware used in the <strong>OilRig Campaign</strong> is the <strong>Helminth</strong> <strong>Backdoor</strong> <strong>Trojan</strong>.<br> Earlier attacks in this campaign infected victims using Windows executables disguised as fake job offers, followed by a malware dropper called <strong>HerHer</strong>.</p> <!--more--><p>Recently, another wave of <strong>OilRig</strong> attacks used spear-phishing emails with Excel spreadsheet attachments. Malicious macros within the spreadsheets download the <strong>Helminth</strong> script which includes a VB script and a Powershell script. Both of these scripts are responsible for continuous communication with the malware's C2 servers.</p> <p>ThreatSTOP customers are protected against the <strong>OilRig Campaign</strong>, and the <strong>HerHer</strong> and <strong>Helminth</strong> malwares.</p></span>