Posted in

Libyan Oil Refinery Hit in Long-Running AsyncRAT Espionage Campaign

A coordinated espionage campaign targeted a Libyan oil refinery, a telecommunications organization, and a state institution between November 2025 and February 2026. The operation deployed AsyncRAT to establish long-term surveillance within critical infrastructure environments. 🚨

Security researchers identified the activity during forensic investigations, uncovering politically themed lure documents specifically crafted to target Libyan organizations.


Why AsyncRAT Was Used

AsyncRAT is a publicly available remote access Trojan widely used by both cybercriminals and state-sponsored actors due to its flexibility and stealth.

Capabilities

  • Keystroke logging
  • Screenshot capture
  • Remote command execution
  • Modular plugin support
  • Persistent surveillance

Because it is open-source and widely accessible, attribution becomes significantly more difficult.


Politically Themed Lure Documents

Attackers used localized and politically sensitive topics to increase credibility.

One lure referenced the killing of Saif al-Gaddafi, leveraging geopolitical tension to entice victims into opening malicious files.

Example filename:

  • “Leaked CCTV footage – Saif al-Gaddafi’s assassination.gz”

This targeted social engineering strongly indicates deliberate intelligence-gathering objectives.


Targeted Critical Infrastructure

The campaign focused on:

  • Oil refinery operations
  • Telecommunications provider
  • Government institution

The attack’s focus on Libya’s energy sector is significant given the country’s growing oil production and strategic geopolitical importance.


Timeline of Activity

  • April 2025 – Early indicators appear
  • November 2025 – Persistent access established
  • December 2025 – Additional activity observed
  • February 2026 – Campaign continues
  • March 2026 – Investigation reveals scope

This demonstrates a long-running intelligence operation.


Multi-Stage Infection Chain

Stage 1 – Spear Phishing

Victims received emails with locally themed lure documents.

Example malicious file:

  • video_saif_gadafi_2026.vbs

Stage 2 – VBS Downloader

The VBS script downloaded additional payloads from cloud hosting infrastructure.


Stage 3 – PowerShell Dropper

The downloader retrieved a disguised file:

  • image.png (PowerShell dropper)

This dropper created persistence using a scheduled task.


Stage 4 – Scheduled Task Persistence

The malware created a task named:

  • “devil”

Configuration stored at:

  • C:\Users\Public\Music\Googless.xml

The task executed at a later time, then deleted itself to evade detection.


Stage 5 – AsyncRAT Deployment

Finally, AsyncRAT was deployed, enabling:

  • Remote system control
  • Data exfiltration
  • Surveillance activity
  • Capability updates

Indicators of Compromise

Security teams should monitor for:

  • Suspicious VBS execution
  • Scheduled tasks from XML files
  • PowerShell dropper activity
  • Public directory persistence files
  • Unexpected outbound connections

Target Sector Risks

SectorRisk
EnergyOperational espionage
TelecomCommunication interception
GovernmentIntelligence gathering
Critical InfrastructureLong-term compromise

Mitigation Recommendations

Organizations should implement:

  • Spear-phishing awareness training
  • Script execution restrictions
  • PowerShell monitoring
  • Scheduled task auditing
  • Endpoint detection deployment

Detection Tips

Watch for:

  • Scheduled tasks created from public folders
  • VBS execution from external sources
  • PowerShell processes spawning unexpectedly
  • AsyncRAT behavioral indicators
  • Unknown outbound command-and-control traffic

Key Takeaways

  • AsyncRAT used for long-term espionage
  • Libya critical infrastructure targeted
  • Politically themed lures deployed
  • Multi-stage infection chain
  • Persistent surveillance capabilities

Conclusion

This campaign highlights how open-source malware like AsyncRAT can be leveraged for sophisticated espionage operations. By combining spear-phishing, scripting-based delivery, and stealth persistence mechanisms, attackers maintained access to sensitive infrastructure for months.

Organizations in energy, telecom, and government sectors should prioritize:

  • Enhanced email security
  • Script execution controls
  • Endpoint monitoring
  • Behavioral detection

Proactive defense is essential to prevent long-term intelligence gathering campaigns. 

Leave a Reply

Your email address will not be published. Required fields are marked *