Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Iranian Hackers Impersonate British Scholars in Recent Campaign

In a recent attack campaign, the Iran-linked threat actor tracked as TA453 has been posing as UK scholars with the University of London’s School of Oriental and African Studies (SOAS) to engage targets of interest and steal their credentials, security researchers with Proofpoint reveal.

In a recent attack campaign, the Iran-linked threat actor tracked as TA453 has been posing as UK scholars with the University of London’s School of Oriental and African Studies (SOAS) to engage targets of interest and steal their credentials, security researchers with Proofpoint reveal.

Referred to as Operation SpoofedScholars, the campaign has been ongoing since at least January 2021, with a focus on harvesting sensitive information from individuals of interest, such as senior professors from well-known academic institutions and people focusing on the Middle East, including experts working with think tanks and journalists.

Believed to be supporting the information collection efforts of the Iranian Revolutionary Guard Corps (IRGC), TA453 engaged in benign conversations with their targets, up to the point when they served a ‘registration link’ leading to a legitimate, albeit compromised website of University of London’s SOAS radio.

In one attack in early 2021, the hackers used a fake persona, “Dr.Hanns Bjoern Kendel, Senior Teaching and Research Fellow at SOAS University in London,” to engage with targets and invite them to a fake conference. The hackers showed willingness to chat with their targets over the phone or through video conferencing software, repeatedly demonstrating “a desire to connect with the target in real-time,” Proofpoint says.

In one instance, the adversary was observed sending a credential harvesting email to a target’s personal account, but without masquerading as Dr. Kendel. Intended victims were senior think tank employees, journalists covering Middle Eastern affairs, and academic professors. Overall, less than ten organizations were targeted.

“These groupings consistently have information of interest to the Iranian government, including, but not limited to, information about foreign policy, insights into Iranian dissident movements, and understanding of U.S. nuclear negotiations, and most of the identified targets have been previously targeted by TA453,” Proofpoint says.

In addition to the spoofing of scholars, an element specific to this campaign is the use of the compromised website of a world class academic institution, in an attempt to give legitimacy to the phishing attempt and increase the chances of success.

Proofpoint expects TA453 to continue abusing legitimate infrastructure in future attacks, as well as to spoof scholars in future attacks aimed at supporting its intelligence collection in support of Iranian government interests.

Advertisement. Scroll to continue reading.

“Academics, journalists, and think tank personnel should practice caution and verify the identity of the individuals offering them unique opportunities,” Proofpoint concludes.

Also tracked as APT35, Ajax Security Team, Charming Kitten, ITG18, NewsBeef, Newscaster, and Phosphorus, TA453 has been active for at least a decade, mainly focused on entities in the Middle East, the U.K., and the U.S., including activists, journalists, and others.

Earlier this year, the threat actor was observed targeting senior medical professionals in the United States and Israel. Last year, it targeted attendees of policy conferences such as the Munich Security Conference and the Think 20 (T20) Summit, Israeli scholars and US government employees, and the World Health Organization (WHO).

Related: “Cyber Disruption” Stops Websites of Iranian Ministry

Related: US Takes Down Iran-linked News Sites, Alleges Disinformation

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cyberwarfare

WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Cyberwarfare

Russian espionage group Nomadic Octopus infiltrated a Tajikistani telecoms provider to spy on 18 entities, including government officials and public service infrastructures.