Information Security Awareness

Phishing Attacks
Know the Threat.
Protect the Operation.

In the energy sector, a single click can compromise critical infrastructure. Learn how attackers exploit trust — and how to stay ahead.

Begin Training
Scroll
0%
of cyberattacks begin with a phishing email
0x
more targeted: energy sector vs. average industry
$0M
average cost of a data breach in energy (2024)
0%
of employees click phishing links in simulations

What Is Phishing?

Phishing is a cyberattack where criminals impersonate trusted sources to steal sensitive information — passwords, operational data, or access credentials. In oil & gas, the stakes are critical infrastructure.

Email Phishing

Fraudulent emails disguised as internal memos, vendor invoices, or SCADA system alerts requesting urgent action.

SMS / WhatsApp

Text messages with links claiming to be from HR, IT support, or management — targeting personal and corporate devices.

Voice Phishing (Vishing)

Phone calls impersonating IT helpdesk, bank officials, or government authorities requesting verification codes.

QR Code Attacks

Malicious QR codes in emails, printouts, or on-site locations redirecting to credential harvesting pages.

Fake Websites

Cloned corporate portals, banking platforms, and government services designed to capture login credentials and OTPs.

How a Phishing Attack Unfolds

Click each stage to see how attackers move through the kill chain — from initial contact to data exfiltration.

Stage 01 — Delivery

A Fake Message Arrives

The attacker sends a crafted email, SMS, or message that appears to come from a trusted source — an internal department, a contractor, or a government entity.

Energy sector example: An email from "HSE Department": "URGENT: Updated safety protocols for offshore operations. Review and acknowledge within 24 hours." The attachment contains malware targeting industrial control systems.
Stage 02 — Exploitation

Urgency Triggers Action

The message creates pressure — a security alert, payment deadline, or compliance requirement — designed to bypass your critical thinking.

Energy sector example: "Your VPN access will be revoked in 2 hours due to a security audit. Click here to re-verify your credentials." Attackers know that losing remote access to SCADA systems feels critical.
Stage 03 — Collection

Credentials Are Harvested

You're directed to a convincing fake portal where your login, OTP, or personal data is captured and sent to the attacker.

Energy sector example: A cloned single sign-on page at "adnoc-portal-verify.com" — identical in appearance but controlled by the attacker. Once credentials are entered, they gain access to internal systems and operational technology networks.

Red Flags to Watch For

Train your instincts. These indicators help you identify a phishing attempt before it compromises security.

Urgency & Threats

"Act now", "account suspended", "immediate action required" — pressure designed to override caution.

Credential Requests

Asking for passwords, OTPs, or access codes. Legitimate teams never request these via email.

Suspicious Links

URLs with misspellings, extra characters, or unfamiliar domains — hover before you click.

Unexpected Attachments

Files you didn't request, especially .exe, .zip, or macro-enabled documents from unknown senders.

Impersonation

Messages that "feel off" — unusual tone, formatting errors, or requests outside normal procedures.

Unknown QR Codes

QR codes in unexpected places — emails, printouts, or shared areas without clear origin.

How to Protect Yourself

Six essential practices that form your personal security perimeter — as critical as any firewall protecting our infrastructure.

01

Verify the Sender

Always confirm the sender's identity through a separate, trusted channel before responding to unusual requests.

02

Inspect Before You Click

Hover over links to preview the actual URL. Check for misspellings, extra characters, or unfamiliar domains.

03

Never Share Credentials

Passwords, OTPs, and access codes must never be shared via email, message, or phone — no exceptions.

04

Verify URLs Carefully

Before entering credentials, check the website address. Use official apps and bookmarked links instead of email links.

05

Use Official Channels

Access corporate systems through approved applications and bookmarks — never through links in messages.

06

Question Urgency

If it feels urgent or unusual — pause. Real emergencies are handled through established protocols, not email links.

Test Your Awareness

Can you spot the phishing attempts? Analyze each email scenario and decide — is it real or fake?

Outlook — Inbox
Inbox 5
Sent
Trash
0/5

Enter your name to generate your certificate:

If something feels urgent or unusual —
stop and verify before you act.
Report Suspicious Activity
Contact your IT or Security team immediately — even if you're unsure.