Zephyr Energy loses £700K to contractor payment fraud • The Register
#Security

Zephyr Energy loses £700K to contractor payment fraud • The Register

Privacy Reporter
2 min read

UK oil and gas firm Zephyr Energy confirms £700,000 cyber fraud after attackers rerouted legitimate contractor payment to attacker-controlled account, highlighting growing threat of business email compromise schemes.

UK-listed oil and gas company Zephyr Energy plc has confirmed it lost approximately £700,000 after cybercriminals intercepted and redirected a legitimate payment to a contractor, marking another high-profile victim of business email compromise (BEC) fraud.

The incident, which targeted one of Zephyr's American subsidiaries, involved attackers infiltrating the company's payment process and quietly rerouting funds to an account under their control. The London-headquartered firm, which focuses on technology-led oil and gas development in the US Rocky Mountain region, described the attack as "highly sophisticated" but provided few technical details about how the breach occurred.

According to the company's disclosure, the fraud was discovered after the payment had already been processed and the funds transferred to a third-party account. Zephyr immediately notified law enforcement and engaged external consultants and banking partners in an attempt to recover the stolen funds. However, the company has not indicated whether any portion of the £700,000 has been recovered, and such cases often prove difficult to reverse once money begins moving through multiple accounts.

Business email compromise attacks have become increasingly prevalent in recent years, with criminals exploiting the trust inherent in legitimate business transactions. These schemes typically involve attackers gaining access to email accounts or spoofing trusted contacts to intercept payment instructions or redirect funds during what appears to be routine financial operations.

Zephyr emphasized that the incident was contained and that its core systems and operations remain unaffected. The company stated that external consultants have reviewed its systems and that additional security measures have been implemented, though specific details of these enhancements were not disclosed. Industry experts suggest that such measures typically include stricter verification procedures for payment changes, enhanced authentication for financial transactions, and improved communication protocols between finance departments and external partners.

For investors, Zephyr sought to minimize concerns about the financial impact, noting that the company maintains sufficient working capital to absorb the loss without disrupting ongoing operations. The incident serves as a costly reminder that modern cybercriminals increasingly target the human element of business processes rather than attempting to breach technical systems directly.

The case highlights the evolving nature of cyber threats facing businesses in 2026, where sophisticated social engineering and process manipulation can prove more effective than traditional hacking attempts. As companies continue to strengthen their technical defenses, attackers are adapting by focusing on the weakest link in many security chains: the trust-based processes that underpin everyday business operations.

Featured image

This incident adds to a growing list of high-profile BEC cases that have cost businesses millions in recent years, underscoring the need for organizations to implement robust verification procedures and employee training programs to combat these increasingly sophisticated fraud schemes.

Comments

Loading comments...