A group of Iranian hackers with a history of attacking academic institutions have come back to life to launch a new series of phishing campaigns, security firm Malwarebytes said today.
The new attacks were timed to coincide with the start of the new academic years when both students and university staff were expected to be active on university portals.
The attacks consisted of emails sent to victims. Known as “phishing emails,” they contained links to a website posing as the university portal or an associated app, such as the university library.
The websites were hosted on sites with lookalike domains, but in reality, collected the victim’s login credentials.
Attacks linked to Silent Librarian group
Malwarebytes says the attacks were all orchestrated by the same group, known in cyber-security circles under its codename of Silent Librarian.
The members of this group were indicted in the US in March 2018 for a long string of attacks against universities from all over the globe, dating back as far as 2013.
According to the US indictments, the hackers gained access to university portals from where they stole intellectual property or limited-release academic work, which they later re-sold on their own web portals (Megapaper.ir and Gigapaper.ir).
However, despite the US indictment, the hackers remained at large in Iran and mounted subsequent attacks.
These attacks usually took place each fall, right before the new school year. Their 2018 campaign was documented in a Secureworks report, while Proofpoint spotted last year’s campaign.
Group is now hosting attack servers in Iran
But compared to the past attacks, the 2020 campaign is different.
Malwarebytes said this time around, Silent Librarian hosted some of its phishing sites on Iranian servers.
“It may seem odd for an attacker to use infrastructure in their own country, possibly pointing a finger at them. However, here it simply becomes another bulletproof hosting option based on the lack of cooperation between US or European law enforcement and local police in Iran,” the US security firm said.
Below is a list of universities the group targeted, along with the phishing sites they used, in case students and university staff may want to review any past emails.
Phishing siteLegitimate siteTargetlibrary.adelaide.crev.melibrary.adelaide.edu.auThe University of Adelaide Librarysignon.adelaide.edu.au.itlib.melibrary.adelaide.edu.auThe University of Adelaide Libraryblackboard.gcal.crev.meblackboard.gcal.ac.ukGlasgow Caledonian Universityblackboard.stonybrook.ernn.meblackboard.stonybrook.eduStony Brook Universityblackboard.stonybrook.nrni.meblackboard.stonybrook.eduStony Brook Universitynamidp.services.uu.nl.itlib.menamidp.services.uu.nlUniversiteit Utrechtuu.blackboard.rres.meuu.blackboard.comUniversiteit Utrechtlibrarysso.vu.cvrr.melibrarysso.vu.edu.auVictoria Universityole.bris.crir.meole.bris.ac.ukUniversity of Bristolidpz.utorauth.utoronto.ca.itlf.cfidpz.utorauth.utoronto.caUniversity of Torontoraven.cam.ac.uk.iftl.tkraven.cam.ac.ukUniversity of Cambridgelogin.ki.se.iftl.tklogin.ki.seKarolinska Medical Institutetshib.york.ac.uk.iftl.tkshib.york.ac.ukUniversity of Yorksso.id.kent.ac.uk.iftl.tksso.id.kent.ac.ukUniversity of Kentidp3.it.gu.se.itlf.cfidp3.it.gu.seGöteborg universitetlogin.proxy1.lib.uwo.ca.sftt.cflogin.proxy1.lib.uwo.caWestern University Canadalogin.libproxy.kcl.ac.uk.itlt.tkkcl.ac.ukKing’s College Londonidcheck2.qmul.ac.uk.sftt.cfqmul.ac.ukQueen Mary University of Londonlms.latrobe.aroe.melms.latrobe.edu.auMelbourne Victoria Australiantulearn.ntu.ninu.mentulearn.ntu.edu.sgNanyang Technological Universityadfs.lincoln.ac.uk.itlib.meadfs.lincoln.ac.ukUniversity of Lincolncas.thm.de.itlib.mecas.thm.deTH Mittelhessen University of Applied Scienceslibproxy.library.unt.edu.itlib.melibrary.unt.eduUniversity of North Texasshibboleth.mcgill.ca.iftl.tkshibboleth.mcgill.caMcGill Universityvle.cam.ac.uk.canm.mevle.cam.ac.ukUniversity of Cambridge