Endpoint

8/27/2018
06:00 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Iranian Hackers Target Universities in Global Cyberattack Campaign

Cobalt Dickens threat group is suspected to be behind a large-scale cyberattack wave targeting credentials to access academic resources.

The school year has barely begun and things are off to a rocky start for some colleges: Cobalt Dickens, a threat group linked to the Iranian government, has been spotted targeting universities worldwide in a large-scale credential theft campaign.

Researchers in Secureworks' Counter Threat Unit (CTU) uncovered the cyberattacks after initially spotting an URL spoofing a university login page. Further analysis on the IP address hosting the page revealed a massive attack involving 16 domains with more than 300 spoofed websites and login pages for 76 universities across 14 countries.

Attackers targeted schools in the United States, United Kingdom, Australia, Canada, China, Israel, Japan, and Turkey, among others. The largest concentration of affected universities was in the US. Researchers did not disclose which were targeted but are working to alert them, they report.

Victims who entered their credentials on a fake login page were redirected to the school's legitimate website, where they were either logged into a valid browsing session or prompted to enter their username and password a second time. Several domains referred to the target institution's online library systems, a sign of attackers trying to access academic resources.

Most domains in this campaign were tied to the same IP address and DNS name server. One domain, registered in May 2018, contained subdomains designed to spoof university targets and redirect visitors to fake login pages on other domains controlled by the attackers.

Many of the spoofed domains were registered between May and August 2018; the most recent was created on August 19. It seems threat actors were still building infrastructure to support the campaign at the time Secureworks' CTU found it, researchers report in a blog post.

This campaign shared infrastructure with earlier Cobalt Dickens attacks on academic resources, a popular target for the threat group. In a previous campaign, its actors created lookalike domains to phish targets and used stolen credentials to steal intellectual property (IP).

"Cobalt Dickens' motivation is to obtain access to subscriber-only academic resources as well as mailboxes of university staff and students," says Rafe Pilling, information security researcher with the Secureworks CTU, of the August campaign. "Revenue generation is likely a key motivator, but the resulting access could be used for other campaigns like onward phishing and intrusion against targets that might implicitly trust contacts linked to educational institutions." However, he notes, there has so far been no observation of this type of activity.

There are several reasons why universities are hot targets for attackers seeking IP. For starters, they're harder to secure than financial companies, healthcare organizations, and other institutions in more regulated industries. They also attract some of the world's most intelligent researchers and students, making them treasure troves of new ideas and information.

Post-Indictments

Earlier this year, the US Department of Justice indicted the Mabna Institute and nine Iranians for their involvement with Cobalt Dickens activity conducted between 2013 and 2017.

Many threat groups stick with their tactics despite disclosures like these, and CTU says the August activity could be a sign the group is continuing its campaigns despite its members' indictments.

"This activity aligns with Cobalt Dickens' previous MO," says Pilling of the May-August campaign. "Based on our investigation, they haven't seemed to have modified their tactics significantly when compared to the campaign they've been running over the past few years."

"If it ain't broke … ' as the saying goes," he adds.

Pilling anticipates the activity will continue as the indictments by the DoJ don't appear to have been a strong deterrent. The basic rules of security hygiene apply: phishing awareness is key to defending against this type of activity, he says, and users should be educated on what to look for and to avoid entering their credentials in a site linked within an email.

"Any email that wants you to click a link and enter credentials should be considered suspect," he says.

Related Content:

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
High Stress Levels Impacting CISOs Physically, Mentally
Jai Vijayan, Freelance writer,  2/14/2019
Valentine's Emails Laced with Gandcrab Ransomware
Kelly Sheridan, Staff Editor, Dark Reading,  2/14/2019
Making the Case for a Cybersecurity Moon Shot
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  2/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-8980
PUBLISHED: 2019-02-21
A memory leak in the kernel_read_file function in fs/exec.c in the Linux kernel through 4.20.11 allows attackers to cause a denial of service (memory consumption) by triggering vfs_read failures.
CVE-2019-8979
PUBLISHED: 2019-02-21
Koseven through 3.3.9, and Kohana through 3.3.6, has SQL Injection when the order_by() parameter can be controlled.
CVE-2013-7469
PUBLISHED: 2019-02-21
Seafile through 6.2.11 always uses the same Initialization Vector (IV) with Cipher Block Chaining (CBC) Mode to encrypt private data, making it easier to conduct chosen-plaintext attacks or dictionary attacks.
CVE-2018-20146
PUBLISHED: 2019-02-21
An issue was discovered in Liquidware ProfileUnity before 6.8.0 with Liquidware FlexApp before 6.8.0. A local user could obtain administrator rights, as demonstrated by use of PowerShell.
CVE-2019-5727
PUBLISHED: 2019-02-21
Splunk Web in Splunk Enterprise 6.5.x before 6.5.5, 6.4.x before 6.4.9, 6.3.x before 6.3.12, 6.2.x before 6.2.14, 6.1.x before 6.1.14, and 6.0.x before 6.0.15 and Splunk Light before 6.6.0 has Persistent XSS, aka SPL-138827.