A view of an electronic power transmission tower with energy cables, set against a backdrop of city buildings.

New ‘Power Parasites’ Phishing Scam Targets Energy Sector And Major Brands

Power Parasites is a highly sophisticated phishing scam that has targeted major energy companies and blue-chip brands globally. The scammers deceived unsuspecting victims with fake investment and employment offers by registering over 150 spoof websites and using the logos of companies such as Siemens Energy, Schneider Electric, EDF Energy, Repsol, Suncor, and even Netflix and Starlink.

The campaign is regularly active in South Asia, including Bangladesh, Nepal, and India. It also reaches Latin America, with the content translated into English, Spanish, Bangla, and Arabic.

This phishing campaign has misled many individuals into believing they were in contact with legitimate organisations, using professional-looking websites and convincing emails. The scammers collected personal details and diverted funds into their own accounts under the guise of promising job opportunities.

Scammers created fake investment websites that resembled authentic company sites. They frequently contained “invite code” fields to create a sense of exclusivity. Well-known energy brands assured victims of high returns. They were manipulated into making payments through fictitious payment systems.

Fake attachment from a job-offer scams campaign
Fake attachment from a job-offer scams campaign (Silent Push)

Attackers can take over accounts or reroute payment deposits after entering personal information. The coding of many of these phishing websites is identical, which enables scammers to swiftly launch new domains when others are taken down. These scams are made more widespread by social media sites and Telegram groups. Posting foreign videos and links, scammers frequently get over basic content controls.

Behind the Scenes of a Power Parasites Phishing Scam

Investigations into the campaign revealed domains such as sem-energy[.]net and se-renewables[.]info. To appear more credible, scammers included links to defunct Telegram groups and used well-known buzzwords like “SE” (Siemens Energy) and “AMD” (Advanced Micro Devices).

Other major firms have also been targeted. Suncor Energy and Repsol S.A. have issued public warnings to consumers and job seekers about fake identity operations. Repsol’s statement notes that AI-generated messages are increasingly used to mimic official communication and mislead individuals through counterfeit channels.

Fake Repsol login page created by Power Parasites scammers
Fake Repsol login page created by Power Parasites scammers (Silent Push)

The scam has also made its way to YouTube, where conversant videos advertise fake names such as se-renewables[.]info. One video, translated from Bangladesh, claimed users they could “Earn free money from new sites” – showing the scammers’ multilingual targeting strategy.

Additionally, Siemens Energy has warned the public in statements. The business confirms that it does not operate investment platforms and that there are never any costs associated with the application or hiring process.

A related investment fraud, operating under the name “Repsol Gain” and identified by the U.K. Financial Conduct Authority, demonstrates that several threat actors may be targeting the same brand using different templates and names, such as repsolgain[.]com, which was discovered in old web archives.

Silent Push’s analysis shows that this campaign is still continuing effectively in 2025. Caution must be taken since scammers typically use fake login pages to hide poor-quality investment or job opportunities.

The Power Parasites group continues to evolve, using aggressive social media tactics to facilitate technological tricks. Effective cybersecurity and greater public awareness are necessary to mitigate the financial and personal damages brought by such threats.

This highlights the urgent need for stronger cybersecurity practices and greater public awareness. Organisations should train staff and customers to spot minor URL changes and encourage the use of bookmarks rather than relying on search results. Combine multi-factor authentication (MFA) with user training on social engineering techniques that target one-time codes.

Phishing attacks are on the rise, and it is important to protect your organisation. One effective way to do this is by increasing user awareness about these types of attacks. Phishing Tackle is a great resource that can help you in this regard. We offer a free 14-day trial to help train your users to recognise and avoid phishing attacks. 

Although technology can be helpful, it cannot spot 100% of phishing emails. Therefore, user education is important to minimising the impact of any successful attacks. Consulting with Phishing Tackle can provide valuable insights and tools to help you strengthen your defences against phishing attacks.

Recent posts