Business News

The makers of ‘Iranian’ magic at the University of London

[ad_1]

Iranian pirates imitated students at London’s School of Oriental and African Study to launch a bold campaign against Middle Eastern experts, according to cyber security company Proofpoint.

The experiment was carried out by a group called the Charming Kitten, also known as “Phosphorus” and APT35, which is widely considered by regional experts to act wisely on behalf of the brutal Revolutionary Guard in Iran.

Iran – along with Russia, China and North Korea – is one of the strongest in the cyber wars facing the UK and its allies. Lindy Cameron, head of the National Cyber ​​Security Center, GCHQ’s intelligence unit, warned last month that Iran was using digital technology to “destroy and steal” from several British institutions.

NCSC has already stated Iran’s interest in online spying the goal of UK experts, in addition to the 2018 campaign which received more information from university staff by creating false pages linked to student libraries.

The most recent project, known as Proofpoint, involves hackers who send spoof emails claiming to be from Soas’s actual training, inviting potential participants to meetings and events. Once the alliance was formed, the recipients, who were experts in Middle East issues from tanks, education and the media, were sent to a well-known website that thieves had posted on the website of Soas Radio, an independent broadcaster on the university’s website.

On this page, spies controls were invited to “register” events by disclosing their personal information, including passwords, seizures and those who stole and used other sites, such as social media accounts. Respondents were also encouraged to share their mobile phone numbers, which Proofpoint said was probably an attempt to put malware into the device.

The cyber security company, which released the details of the campaign on Tuesday, knows about 10 people who are following them, most of them in the US and UK. The campaign started in January, and a few months later the hackers started sending emails claiming to be from Soas’ second course. These individuals will not be charged with felony criminal mischief.

Sherrod DeGrippo, head of Proofpoint’s forensic investigation, said the operation was a testament to the fact that after reducing the number of fraudulent activities carried out during the Covid-19s last year, government-backed thieves have “returned to power”.

“Iran has always been very focused [targeting] students, scientists, professors and spies, ”said DeGrippo. “This just shows that he is still looking, especially because it has been profitable.”

In his report, Proofpoint said the hijackers have always wanted to know more about foreign affairs, including awareness of the anti-Iran movement, as well as an understanding of Tehran’s negotiations with the US on nuclear issues.

Soas stressed that those who wanted to try were not university staff, but other students, and said there was no idea that the staff had violated cyber security laws.

He also said that no personal information or knowledge of Soas’ activities was available at the time.

“We became aware of the shelter earlier this year, planned and disclosed the violations in a transparent manner,” it said, adding that the university had “played a role in strengthening security. [its] circular systems “.

The NCSC, which advises self-defense in the UK, said it was aware of the “campaign” and was “working” with students to help tackle the cyber crisis.

“Universities are looking for valuable resources that can make them a lucrative target for offenders, including aggressive countries and cyber criminals,” it said.

[ad_2]

Source link

Related Articles

Leave a Reply

Back to top button