London's School of Oriental and African Studies. Courtesy: SOAS
London's School of Oriental and African Studies. Courtesy: SOAS
London's School of Oriental and African Studies. Courtesy: SOAS
London's School of Oriental and African Studies. Courtesy: SOAS

Iranian hackers posed as British-based academic in failed espionage effort


  • English
  • Arabic

An Iranian group masqueraded as a British-based academic during a cyber espionage campaign.

The group also compromised the website belonging to the School of Oriental and African Studies (SOAS), University of London, to try to steal information.

The operation, which did not affected SOAS data systems, was uncovered by cyber security company Proofpoint. They called it "SpoofedScholars" and said it showed an increase in threat sophistication.

The attackers, sometimes referred to as "Charming Kitten" and believed to be linked to the Iranian state, were also willing to engage in real-time conversations with their targets, who were mainly in the US and UK.

In early 2021, emails claiming to come from a "senior teaching and research fellow" at SOAS invited people to join an online conference called The US Security Challenges in the Middle East.

The emails, sent from a Gmail address, were not from the academic but an espionage group believed to be linked to the Iranian Islamic Revolutionary Guard Corps (IRGC).

Once a conversation was established, the target was sent a "registration link" hosted by a website that was compromised by the attackers.

It belonged to SOAS radio, an independent online radio station and production company based at SOAS.

This link then offered a means to log on using email providers Google, Yahoo, Microsoft, iCloud, Outlook, AOL, mail.ru, Email, and Facebook, which could then capture the passwords and usernames.

Stealing credentials is not new, but the use of a real website to do so is.

"It is highly unusual and more sophisticated for this group," said Sherrod DeGrippo, senior director, threat research and detection for Proofpoint.

The communications between the fake academic and the target could be lengthy to build trust before sending the registration link. In some cases, the sender asked to connect by phone with the recipients to discuss the invitation.

In one instance, the recipient asked for and received more detail by email, with the attackers then suggesting they connect by videoconference.

That cyber spies were trying to connect in real time with individuals by phones and videoconferencing to talk rather than just engaging by email was also unusual, suggesting confidence in their skills in English and in impersonation.

It was not clear if conversations took place.

The operation was highly focused, involving fewer than 10 target organisations, Proofpoint said. In some cases, there were multiple individuals inside those organisations.

They were primarily from three groups:

  • Senior think tank personnel working on the Middle East
  • Journalists focused on the region
  • Academics, including senior professors

It is thought likely that they were selected because they might have information on foreign policy of countries towards Iran, negotiations about Iran's nuclear programme, or information about Iranian dissidents.

This fits with earlier activity by the same espionage group, which Proofpoint called TA453.

"TA453's continued interest in these targets demonstrates an Iranian commitment to user cyber operations to collect intelligence in support of intelligence priorities," Ms DeGrippo said.

A few months after the initial campaign began in January, another SOAS academic's identity was used by the group to try to recruit for a webinar.

The group also seemed interested in mobile phone numbers, possibly to use to deliver malicious software or to use to against others.

SOAS said no personal information was obtained and its data systems were not affected.

It said the compromised radio website was separate from the official SOAS website and not part of any of its academic domains.

"Once we became aware of the dummy site earlier this year, we immediately remedied and reported the breach in the normal way. We have reviewed how this took place and taken steps to further improve protection of these sort of peripheral systems," the university said.

Proofpoint said it cannot be completely sure the IRGC was behind the campaign but the tactics, techniques and the targeting give it "high confidence" that it was responsible.

The company said it has worked with the authorities on victim notification but that TA453 was likely to continue to try to pass itself off as academics.

Proofpoint recommended that academics, journalists, and think tank scholars should verify the identity of anyone offering them opportunities, especially if approached online.

Unresolved crisis

Russia and Ukraine have been locked in a bitter conflict since 2014, when Ukraine’s Kremlin-friendly president was ousted, Moscow annexed Crimea and then backed a separatist insurgency in the east.

Fighting between the Russia-backed rebels and Ukrainian forces has killed more than 14,000 people. In 2015, France and Germany helped broker a peace deal, known as the Minsk agreements, that ended large-scale hostilities but failed to bring a political settlement of the conflict.

The Kremlin has repeatedly accused Kiev of sabotaging the deal, and Ukrainian officials in recent weeks said that implementing it in full would hurt Ukraine.

Various Artists 
Habibi Funk: An Eclectic Selection Of Music From The Arab World (Habibi Funk)
​​​​​​​

MOUNTAINHEAD REVIEW

Starring: Ramy Youssef, Steve Carell, Jason Schwartzman

Director: Jesse Armstrong

Rating: 3.5/5

India cancels school-leaving examinations
UAE currency: the story behind the money in your pockets
COMPANY%20PROFILE%20
%3Cp%3EName%3A%20DarDoc%3Cbr%3EBased%3A%20Abu%20Dhabi%3Cbr%3EFounders%3A%20Samer%20Masri%2C%20Keswin%20Suresh%3Cbr%3ESector%3A%20HealthTech%3Cbr%3ETotal%20funding%3A%20%24800%2C000%3Cbr%3EInvestors%3A%20Flat6Labs%2C%20angel%20investors%20%2B%20Incubated%20by%20Hub71%2C%20Abu%20Dhabi's%20Department%20of%20Health%3Cbr%3ENumber%20of%20employees%3A%2010%3C%2Fp%3E%0A
Yahya Al Ghassani's bio

Date of birth: April 18, 1998

Playing position: Winger

Clubs: 2015-2017 – Al Ahli Dubai; March-June 2018 – Paris FC; August – Al Wahda

Superliminal%20
%3Cp%3EDeveloper%3A%20Pillow%20Castle%20Games%0D%3Cbr%3EPublisher%3A%20Pillow%20Castle%20Games%0D%3Cbr%3EConsole%3A%20PlayStation%204%26amp%3B5%2C%20Xbox%20Series%20One%20%26amp%3B%20X%2FS%2C%20Nintendo%20Switch%2C%20PC%20and%20Mac%0D%3Cbr%3ERating%3A%204%2F5%3C%2Fp%3E%0A
Silent Hill f

Publisher: Konami

Platforms: PlayStation 5, Xbox Series X/S, PC

Rating: 4.5/5

The specs

Engine: 4.0-litre V8 twin-turbocharged and three electric motors

Power: Combined output 920hp

Torque: 730Nm at 4,000-7,000rpm

Transmission: 8-speed dual-clutch automatic

Fuel consumption: 11.2L/100km

On sale: Now, deliveries expected later in 2025

Price: expected to start at Dh1,432,000

Lexus LX700h specs

Engine: 3.4-litre twin-turbo V6 plus supplementary electric motor

Power: 464hp at 5,200rpm

Torque: 790Nm from 2,000-3,600rpm

Transmission: 10-speed auto

Fuel consumption: 11.7L/100km

On sale: Now

Price: From Dh590,000

GAC GS8 Specs

Engine: 2.0-litre 4cyl turbo

Power: 248hp at 5,200rpm

Torque: 400Nm at 1,750-4,000rpm

Transmission: 8-speed auto

Fuel consumption: 9.1L/100km

On sale: Now

Price: From Dh149,900

The years Ramadan fell in May

1987

1954

1921

1888

Tips to avoid getting scammed

1) Beware of cheques presented late on Thursday

2) Visit an RTA centre to change registration only after receiving payment

3) Be aware of people asking to test drive the car alone

4) Try not to close the sale at night

5) Don't be rushed into a sale 

6) Call 901 if you see any suspicious behaviour

Updated: July 27, 2021, 7:11 AM