IAC-SC

Main Menu

  • Home
  • News
  • Blog
  • Events
  • Gallery
    • Visuals
  • About
    • Contact

IAC-SC

  • Home
  • News
    • How Iran pays mafia hitmen to carry out assassinations in Europe

      June 3, 2025
      0
    • Bipartisan House Majority Endorses Maryam Rajavi's Ten-point Plan

      May 26, 2025
      0
    • Seven Iranians Arrested in UK

      May 22, 2025
      0
    • NCRI Reveals Secret Iranian Nuclear Weapons Facility under Petrochemical Cover

      May 11, 2025
      0
    • Trump warns Iran will be ‘held responsible’ for Houthi attacks from Yemen

      March 23, 2025
      0
    • Maryam Rajavi’s Roadmap for the Transitional Period in Post-theocracy Iran

      March 6, 2025
      0
    • Over 150 lawmakers lend support to resistance movement inside Iran as regime's ...

      March 2, 2025
      0
    • Iran Is Developing Plans for Faster, Cruder Weapon, U.S. Concludes

      January 7, 2025
      0
    • Iran executes over 1K prisoners in 2024, highest total in 30 years, ...

      January 6, 2025
      0
  • Blog
    • The Regime’s Pen: How Iran’s Clerical Dictatorship Uses Friendly Journalists as Propaganda ...

      March 28, 2025
      0
    • Iran's human rights tragedy and a nation's struggle for democracy

      December 27, 2023
      0
    • Risking revival of unrest, Iran rulers tighten curbs on dissent

      July 21, 2023
      0
    • Time for Western Democracies to Stand with Iranian People

      June 14, 2023
      0
    • Policy Shift Toward Iran Needed

      December 23, 2022
      0
    • To support Iran’s people, engage with the Iranian Resistance

      June 25, 2022
      0
    • Torricelli: Secretary Pompeo Eyes New Iranian Revolution

      May 23, 2022
      0
    • Pompeo's Visit with MEK Will Rattle Tehran

      May 20, 2022
      0
    • To get Iran to change its behavior, the Biden team must engage ...

      December 19, 2021
      0
  • Events
  • Gallery
    • Visuals
  • About
    • Contact
News
Home›News›State-Sponsored Cyber Theft

State-Sponsored Cyber Theft

By IAC-SC
March 24, 2018
1274
0
Share:

Nine Iranians Charged in Massive Hacking Campaign on Behalf of Iran Government

FBI NEWS    |    March 23, 2018

Nine Iranian citizens – working at the behest of the government of Iran—have been charged in a massive computer hacking campaign that compromised U.S. and foreign universities, private companies, and U.S. government entities, including the Department of Labor and the Federal Energy Regulatory Commission.

The hackers were affiliated with the Mabna Institute, an Iran-based company created in 2013 for the express purpose of illegally gaining access to non-Iranian scientific resources through computer intrusions. Members of the institute were contracted by the Islamic Revolutionary Guard Corps—one of several entities within the Iranian government responsible for gathering intelligence—as well as other Iranian government clients.

During a more than four-year campaign, these state-sponsored hackers “compromised approximately 144 U.S.-based universities and 176 foreign universities in 21 countries,” said FBI Deputy Director David Bowdich during a press conference today at the Department of Justice in Washington to announce the indictments. When the FBI learned of the attacks, he said, “we notified the victims so they could take action to minimize the impact. And then we took action to find and stop these hackers.”

Initially, the cyber criminals used an elaborate spear-phishing campaign to target the e-mail accounts and computer systems of their victims, which in addition to the universities included nearly 50 domestic and foreign private-sector companies, the states of Hawaii and Indiana, and the United Nations.

According to the indictments unsealed today in a Manhattan federal court, the hackers stole more than 30 terabytes of academic data and intellectual property—roughly three times the amount of data contained in the print collection of the Library of Congress.

“Their primary goal was to obtain user names and passwords for the accounts of professors so they could gain unauthorized access and steal whatever kind of proprietary academic information they could get their hands on,” said a special agent who investigated the case from the FBI’s New York Division. “That information included access to library databases, white papers, journals, research, and electronic books. All that information and intellectual property was provided to the Iranian government,” he added.

Mabna Institute targeted more than 100,000 accounts of professors around the world and successfully compromised approximately 8,000 of those accounts. The campaign continued through at least December 2017. Although it is difficult to calculate a dollar loss amount, through the course of the conspiracy, U.S.-based universities spent approximately $3.4 billion to procure and access data that the Iranians accessed for free because of their criminal activity.

“The hackers did their homework,” the cyber agent said. They conducted online reconnaissance of professors to determine the individuals’ research interests and the academic articles they had published. Armed with that information, they sent spear-phishing e-mails to their targets—messages that appeared to be from professors at other universities.

Victim professors believed they were dealing with colleagues who had expressed an interest in academic articles. The e-mails tricked many of the professors to click on links that recorded their keystrokes when they signed into what they thought were their secure university domains but were actually bogus sites controlled by the hackers.

The Iranians targeted data across all fields of research and academic disciplines, including science and technology, engineering, social sciences, medical, and other professional fields.

In addition to targeting universities, the hackers gained access to employee e-mail accounts at nearly 50 private companies around the world—the majority of them U.S. firms. Among the U.S.-based victims were academic publishers, media and entertainment companies, technology companies, and investment firms. During that same period in 2016, the hackers also began conducting intrusions against various U.S. federal agencies and other organizations such as the United Nations.

This brute force technique involves collecting lists of names and e-mail accounts through open-source Internet searches and then guessing the users’ passwords, betting that some users never changed default company passwords or used common ones such as “password123.” Password spraying is such an unsophisticated technique that it can go undetected by company security networks. “They were flying under the radar,” said the cyber agent who investigated the case, “and the magnitude of their effort was remarkable.”

The tactic worked, providing hackers access to victims’ entire e-mail accounts. Now, in addition to academic data, the hackers were accessing companies’ trade secrets and sensitive U.S. government information.

The nine defendants, who all reside in Iran, have been charged with conspiracy to commit computer intrusions, wire fraud, unauthorized access of a computer, and aggravated identity theft.

Bowdich acknowledged that apprehending the Iranian cyber criminals presents a challenge, “but it’s not impossible.” He explained that the defendants might travel outside of Iran and be subject to arrest. “Where we can’t apprehend these individuals quickly,” he added, “we will resort to different methods—naming and shaming, sanctions, and a lot of publicity. We will keep at it,” he said, “because the FBI and our partners at the Department of Justice have a very long memory.”

https://www.fbi.gov/news/stories/nine-iranians-charged-in-hacking-scheme-032318

 

 

Previous Article

Liberate Iran: Demand Release of Detained Protesters

Next Article

John Bolton is a realist on Iran

0
Shares
  • 0
  • +
  • 0
  • 0
  • 0
  • 0

Related articles More from author

  • News

    Women are leading the revolution to bring down Iran’s regime

    November 30, 2022
    By IAC-SC
  • News

    US-ARAB DISAGREEMENT DEEPENS ON IRANIAN THREATS

    February 9, 2017
    By IAC-SC
  • News

    Iran’s Revolution Will Bring About a Secular Democracy

    January 29, 2023
    By IAC-SC
  • News

    Police arrest 3 in connection with shooting of far-right Spanish politician

    November 25, 2023
    By IAC-SC
  • News

    A public suicide in Iran spotlights anguish over economy

    November 6, 2021
    By IAC-SC
  • News

    Iran’s Pending Regime Change Should Command Broader Awareness

    February 14, 2022
    By IAC-SC

You may interested

  • News

    In Violation of Nuclear Deal, Iran Ships Soldiers to Syria on Commercial Flights

  • News

    A Pawn in a Cruel Political Game’

  • News

    Bipartisan House Majority Endorses Maryam Rajavi’s Ten-point Plan

Latest Tweets

Tweets by @OrgIAC
  • LATEST REVIEWS

  • TOP REVIEWS

Timeline

  • June 3, 2025

    How Iran pays mafia hitmen to carry out assassinations in Europe

  • May 26, 2025

    Bipartisan House Majority Endorses Maryam Rajavi’s Ten-point Plan

  • May 22, 2025

    Seven Iranians Arrested in UK

  • May 11, 2025

    NCRI Reveals Secret Iranian Nuclear Weapons Facility under Petrochemical Cover

  • March 28, 2025

    The Regime’s Pen: How Iran’s Clerical Dictatorship Uses Friendly Journalists as Propaganda Assets

Latest Comments

Find us on Facebook

REP. JOE WILSON (R-SC)

Rep. William Timmons (R-SC)

https://youtu.be/PVE-wDlzkuA

REP. RALPH NORMAN (R-SC)

About us

logo

Iranian American Community of South Carolina (IAC-SC) is an all-volunteer, non-profit, serving the Iranian Americans. We are inspired by Iranian people's desire for a democratic, secular, non-nuclear republic Iran that embraces a peaceful and prosperous Middle East.

Rep. Nancy Mace (R-SC) at IWCC

https://youtu.be/uEE-0eR34H0

Rep. Nancy Mace (R-SC)

https://youtu.be/G41XTzi_zKE
  • Contact
  • About Us
  • Home