WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Suspected State-Sponsored Spear Phishing Campaign Targets U.S. Utilities with New Malware
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Suspected State-Sponsored Spear Phishing Campaign Targets U.S. Utilities with New Malware

Author: Jennifer Walker

Created: Tuesday, August 6, 2019 - 16:12

Categories: Cybersecurity

Cybersecurity firm Proofpoint identified a new spear phishing campaign that targeted three undisclosed U.S. utilities. Based on overlaps with historical campaigns and macros utilized, Proofpoint believes the campaign is state-sponsored. The convincing phishing lures purport to come from the National Council of Examiners for Engineering and Surveying (NCEES), a business that handles professional licensing for engineers and surveyors, indicating the threat actors have a decent amount of industry knowledge. According to Proofpoint, the emails were sent between July 19 and 25, utilized the NCEES logo, and the sender address and reply-to fields featured an impersonated domain, nceess[.]com (designed to look like the NCEES domain but adding an “s” at the end). In typical social engineering fashion, the premise of the email is designed to evoke a sense of urgency by indicating the user failed to achieve a passing exam score. The emails included a malicious Microsoft Word attachment of newly identified malware dubbed LookBack. Analysis of LookBack revealed it is a remote access trojan (RAT) that has capabilities to view process, system and file data; delete files; take screenshots; move and click the infected system’s mouse; reboot machines; and delete itself from an infected host. Perch users subscribed to the WaterISAC Community will be able to detect LookBack within their environments. All members are encouraged to check networks for and report similar activity, especially if dealing with NCEES or similar organizations. Read the article at Threatpost

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated April 30, 2026)

Apr 30, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

Tip of the Week – April 30, 2026

Apr 30, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) Cyber Readiness Institute Joins WaterISAC as a Community Partner to Strengthen Cyber Readiness Across the Water Sector

Apr 30, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar