IAC-SC

Main Menu

  • Home
  • News
  • Blog
  • Events
  • Gallery
    • Visuals
  • About
    • Contact

IAC-SC

  • Home
  • News
    • EU designates Iran's Revolutionary Guard a terror group

      February 1, 2026
      0
    • A Nation Past the Point of Return: Iran’s January 2026 Uprising and ...

      January 22, 2026
      0
    • IRGC Commander Admits to the Mass Killing of Civilians

      January 19, 2026
      0
    • Iranian community reacts to reports of mass killings amid Iran protests

      January 16, 2026
      0
    • More than 400 influential women urge Iran to halt execution of female ...

      December 26, 2025
      0
    • Iran: UN Fact-Finding Mission alarmed by surge in repression and extraordinary spike ...

      November 4, 2025
      0
    • When History Spews the Past

      October 13, 2025
      0
    • UN experts appalled by unprecedented execution  spree in Iran with over 1000 ...

      October 2, 2025
      0
    • Echoes of the 1980s: A Warning from a Former Political Prisoner

      August 23, 2025
      0
  • Blog
    • The women-led resistance the Iranian regime fears most

      February 27, 2026
      0
    • Don’t impose another Persian dictatoron a multinational Iran

      February 17, 2026
      0
    • The Iranian regime’s first victims are its own people

      February 5, 2026
      0
    • Neither Shah Nor Supreme Leader: Can Iran's Theocracy Survive a Nation ...

      January 24, 2026
      0
    • The Untarnished Truth: Regime’s Forty-Year Battle to Discredit the MEK

      October 12, 2025
      0
    •     Reza Pahlavi’s “Transition Plan”:   A Blueprint for Authoritarian Rule ...

      August 23, 2025
      0
    • The Regime’s Pen: How Iran’s Clerical Dictatorship Uses Friendly Journalists as Propaganda ...

      March 28, 2025
      0
    • Iran's human rights tragedy and a nation's struggle for democracy

      December 27, 2023
      0
    • Risking revival of unrest, Iran rulers tighten curbs on dissent

      July 21, 2023
      0
  • Events
  • Gallery
    • Visuals
  • About
    • Contact
News
Home›News›State-Sponsored Cyber Theft

State-Sponsored Cyber Theft

By IAC-SC
March 24, 2018
1383
0
Share:

Nine Iranians Charged in Massive Hacking Campaign on Behalf of Iran Government

FBI NEWS    |    March 23, 2018

Nine Iranian citizens – working at the behest of the government of Iran—have been charged in a massive computer hacking campaign that compromised U.S. and foreign universities, private companies, and U.S. government entities, including the Department of Labor and the Federal Energy Regulatory Commission.

The hackers were affiliated with the Mabna Institute, an Iran-based company created in 2013 for the express purpose of illegally gaining access to non-Iranian scientific resources through computer intrusions. Members of the institute were contracted by the Islamic Revolutionary Guard Corps—one of several entities within the Iranian government responsible for gathering intelligence—as well as other Iranian government clients.

During a more than four-year campaign, these state-sponsored hackers “compromised approximately 144 U.S.-based universities and 176 foreign universities in 21 countries,” said FBI Deputy Director David Bowdich during a press conference today at the Department of Justice in Washington to announce the indictments. When the FBI learned of the attacks, he said, “we notified the victims so they could take action to minimize the impact. And then we took action to find and stop these hackers.”

Initially, the cyber criminals used an elaborate spear-phishing campaign to target the e-mail accounts and computer systems of their victims, which in addition to the universities included nearly 50 domestic and foreign private-sector companies, the states of Hawaii and Indiana, and the United Nations.

According to the indictments unsealed today in a Manhattan federal court, the hackers stole more than 30 terabytes of academic data and intellectual property—roughly three times the amount of data contained in the print collection of the Library of Congress.

“Their primary goal was to obtain user names and passwords for the accounts of professors so they could gain unauthorized access and steal whatever kind of proprietary academic information they could get their hands on,” said a special agent who investigated the case from the FBI’s New York Division. “That information included access to library databases, white papers, journals, research, and electronic books. All that information and intellectual property was provided to the Iranian government,” he added.

Mabna Institute targeted more than 100,000 accounts of professors around the world and successfully compromised approximately 8,000 of those accounts. The campaign continued through at least December 2017. Although it is difficult to calculate a dollar loss amount, through the course of the conspiracy, U.S.-based universities spent approximately $3.4 billion to procure and access data that the Iranians accessed for free because of their criminal activity.

“The hackers did their homework,” the cyber agent said. They conducted online reconnaissance of professors to determine the individuals’ research interests and the academic articles they had published. Armed with that information, they sent spear-phishing e-mails to their targets—messages that appeared to be from professors at other universities.

Victim professors believed they were dealing with colleagues who had expressed an interest in academic articles. The e-mails tricked many of the professors to click on links that recorded their keystrokes when they signed into what they thought were their secure university domains but were actually bogus sites controlled by the hackers.

The Iranians targeted data across all fields of research and academic disciplines, including science and technology, engineering, social sciences, medical, and other professional fields.

In addition to targeting universities, the hackers gained access to employee e-mail accounts at nearly 50 private companies around the world—the majority of them U.S. firms. Among the U.S.-based victims were academic publishers, media and entertainment companies, technology companies, and investment firms. During that same period in 2016, the hackers also began conducting intrusions against various U.S. federal agencies and other organizations such as the United Nations.

This brute force technique involves collecting lists of names and e-mail accounts through open-source Internet searches and then guessing the users’ passwords, betting that some users never changed default company passwords or used common ones such as “password123.” Password spraying is such an unsophisticated technique that it can go undetected by company security networks. “They were flying under the radar,” said the cyber agent who investigated the case, “and the magnitude of their effort was remarkable.”

The tactic worked, providing hackers access to victims’ entire e-mail accounts. Now, in addition to academic data, the hackers were accessing companies’ trade secrets and sensitive U.S. government information.

The nine defendants, who all reside in Iran, have been charged with conspiracy to commit computer intrusions, wire fraud, unauthorized access of a computer, and aggravated identity theft.

Bowdich acknowledged that apprehending the Iranian cyber criminals presents a challenge, “but it’s not impossible.” He explained that the defendants might travel outside of Iran and be subject to arrest. “Where we can’t apprehend these individuals quickly,” he added, “we will resort to different methods—naming and shaming, sanctions, and a lot of publicity. We will keep at it,” he said, “because the FBI and our partners at the Department of Justice have a very long memory.”

https://www.fbi.gov/news/stories/nine-iranians-charged-in-hacking-scheme-032318

 

 

Previous Article

Liberate Iran: Demand Release of Detained Protesters

Next Article

John Bolton is a realist on Iran

0
Shares
  • 0
  • +
  • 0
  • 0
  • 0
  • 0

Related articles More from author

  • News

    In Iran, Religious Minority Children Are To Stay Silent If They Want To Study

    October 18, 2019
    By IAC-SC
  • News

    an accused of stealing bodies of slain protesters

    December 6, 2022
    By IAC-SC
  • News

    Senators’ meeting with opposition leader sends the right message to Iran

    September 2, 2017
    By IAC-SC
  • News

    STEIL INTRODUCES BILL TO PREVENT IRAN SANCTIONS EVASION

    July 4, 2020
    By IAC-SC
  • News

    OIAC Welcomes Introduction of Comprehensive Legislation in the Senate to Hold Iran Regime Accountable

    March 29, 2017
    By IAC-SC
  • News

    Iran says it detained 21,000 suspects during the June war with Israel

    August 16, 2025
    By IAC-SC

You may interested

  • News

    Democratic Muslims are the Most Effective Force to Defeat Islamic Extremism

  • Blog

    Trafficking In Iran; A Major Concern

  • News

    US seeking info on Iranian-American reportedly executed in Iran

Latest Tweets

Tweets by @OrgIAC
  • LATEST REVIEWS

  • TOP REVIEWS

Timeline

  • February 27, 2026

    The women-led resistance the Iranian regime fears most

  • February 17, 2026

    Don’t impose another Persian dictatoron a multinational Iran

  • February 5, 2026

    The Iranian regime’s first victims are its own people

  • February 1, 2026

    EU designates Iran’s Revolutionary Guard a terror group

  • January 24, 2026

    Neither Shah Nor Supreme Leader: Can Iran’s Theocracy Survive a Nation in Revolt?

Latest Comments

Find us on Facebook

REP. JOE WILSON (R-SC)

Rep. William Timmons (R-SC)

https://youtu.be/PVE-wDlzkuA

REP. RALPH NORMAN (R-SC)

About us

logo

Iranian American Community of South Carolina (IAC-SC) is an all-volunteer, non-profit, serving the Iranian Americans. We are inspired by Iranian people's desire for a democratic, secular, non-nuclear republic Iran that embraces a peaceful and prosperous Middle East.

Rep. Nancy Mace (R-SC) at IWCC

https://youtu.be/uEE-0eR34H0

Rep. Nancy Mace (R-SC)

https://youtu.be/G41XTzi_zKE
  • Contact
  • About Us
  • Home