WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Threat Update – LookBack RAT Still Targeting U.S. Utilities
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Threat Update – LookBack RAT Still Targeting U.S. Utilities

Author: Jennifer Walker

Created: Tuesday, September 24, 2019 - 16:27

Categories: Cybersecurity, Security Preparedness

As WaterISAC shared in its August 6 Security and Resilience Update, the LookBack remote access trojan has a penchant for targeting U.S. utilities. Likewise, WaterISAC is aware of at least one member utility that received an email consistent with activity described in the LookBack campaign. The email purported to be from a state water sector association, Florida Rural Water Association (FRWA). Cybersecurity firm Proofpoint has identified at least 17 entities in the U.S. utilities sector targeted by these actors from April 5 through August 29, 2019. Activity in the first campaign identified by Proofpoint purported to come from the National Council of Examiners for Engineering and Surveying (NCEES), a business that handles professional licensing for engineers and surveyors. In a recent campaign between August 21 and August 29, 2019, several spear phishing emails originated from what appears to be an actor-controlled domain: globalenergycertification[.]net. This domain masqueraded as the legitimate domain for Global Energy Certification (“GEC”); GECs official domain ends in [.]org. The emails include a GEC examination-themed body and a malicious Microsoft Word attachment that uses macros to install and run LookBack. Proofpoint determined a new TTP involving scanning activity for SMB over IP via port 445 up to two weeks prior to the arrival of phishing emails. Perch users subscribed to the WaterISAC Community will be able to detect these additional LookBack IoCs within their environments. All members are encouraged to check networks and report similar activity, especially if dealing with NCEES, FRWA, GEC or similar sector-specific organizations. For additional details regarding reconnaissance, delivery, and exploitation, read the post at Proofpoint

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar