London university targeted by Iranian hackers: Cybersecurity company

School of Oriental & African Studies, London. (Wikimedia Commons)
Short Url
Updated 13 July 2021
Follow

London university targeted by Iranian hackers: Cybersecurity company

  • They impersonated academics at School of Oriental and African Studies to harvest info
  • Expert: ‘Iran has always been very focused on (compromising) academics, scientists, professors, diplomats’

LONDON: A cybersecurity company has accused Iranian hackers of impersonating academics at London’s School of Oriental and African Studies (SOAS) to target Middle East experts.

Proofpoint said the intrusions were launched by the Charming Kitten group, which is also known as Phosphorus and APT35. 

The outfit is believed to regularly conduct hacking attempts for the Islamic Revolutionary Guard Corps, Iran’s asymmetric warfare force. 

The move comes amid heightened concern in Britain over cyberattacks from hostile states. Lindy Cameron, CEO of the National Cyber Security Centre (NCSC), recently warned that Tehran is seeking to use cyber strategies to “sabotage and steal” from UK institutions. 

NCSC reports have detailed the specific risk from Iranian cyberespionage on UK universities. Its warnings were highlighted following Tehran’s efforts in 2018 to gather personal details from university staff by duping them with phony websites.

The NCSC said it is aware of this latest attack by the Iranian outfit. The attack saw hackers impersonating SOAS academics in fake emails, asking professors, journalists and other Middle East experts to attend conferences and discussions. 

After conversing and gaining their trust, the Iranian hacking group sent the experts to a spoof web page that they had added to an independent radio station based at SOAS. 

The page invited the experts to submit their personal details, including a password, to access the fake events.

Details harvested by the cyber operation were then used to access other sites, such as the experts’ email accounts. 

Proofpoint said the Iranian group may have also used mobile numbers gathered at the site to infect phones with malware.

It said it knew of around a dozen experts who were targeted, most of them based in Britain and the US.

The operation proved that state-sponsored hackers “are really back in the seat,” said Sherrod DeGrippo, Proofpoint’s senior director of threat research.

“Iran has always been very focused on (compromising) academics, scientists, professors and diplomats. This just shows that they’re continuing that focus, most likely because it’s been paying off.” 

Proofpoint, in a report released on Tuesday, said the group is gathering information regarding geopolitics and foreign policy, especially on Iranian dissidents’ behavior.

SOAS said no personal information from its systems had been breached during the cyberattack.

“Once we became aware of the dummy site … we immediately remedied and reported the breach in the normal way,” it added. SOAS said it had “taken steps to further improve protection of (its) peripheral systems.”


No sign Iran’s nuclear sites were hit, IAEA says, but Iran alleges one was

Updated 11 sec ago
Follow

No sign Iran’s nuclear sites were hit, IAEA says, but Iran alleges one was

VIENNA: The UN nuclear watchdog has no indication Israeli and US attacks on Iran have ​hit any nuclear facilities, its chief Rafael Grossi told the agency’s Board of Governors on Monday, moments before Iran’s envoy said one was targeted a day earlier.
Iran’s nuclear program has been among the reasons Israel and the US have given for the attacks, alleging Iran was getting too close to being ‌able to ‌eventually make an atom bomb.
At ​the ‌same ⁠time, ​what remains ⁠of Iran’s atomic facilities after the two militaries attacked them in June appears to have been largely spared in this campaign so far.
“We have no indication that any of the nuclear installations ... have been damaged or hit,” International Atomic Energy Agency chief Rafael Grossi ⁠said in a statement to a ‌meeting of his agency’s 35-nation ‌Board of Governors.
What that assessment ​was based on is ‌unclear, since he also said his agency had not ‌been able to reach its counterparts in Iran. Tehran has not let the IAEA return to its bombed facilities since they were attacked in June.
“Efforts to contact the Iranian ‌nuclear regulatory authorities ... continue, with no response so far. We hope this indispensable channel ⁠of communication ⁠can be re-established as soon as possible,” he said.
Moments later, Iran’s ambassador to the IAEA, Reza Najafi, told reporters outside the closed-door meeting that the sprawling nuclear complex at Natanz had been attacked.
Natanz housed two uranium-enrichment plants that were attacked in June — an above-ground one that the IAEA says was destroyed and an underground one that was at least badly damaged, among other facilities.
“Again they attacked Iran’s peaceful, safeguarded ​nuclear facilities yesterday,” Najafi ​said. Asked by Reuters which facilities were hit, he replied: “Natanz” and left.