Silent Librarian, also called Cobalt Dickens and TA407, based in Iran has initiated again spear phishing attacks on colleges in the US and across the world. Since 2013, the hacking group has been doing attacks to get access to login credentials and swipe intellectual property and research files. Stolen credentials and data are afterwards marketed using the hacking group’s sites.
The U.S. Department of Justice charged 9 Iranians connected with the attacks in 2018, although the charges did not affect the campaigns which have kept going. Those people have yet to answer for their crimes.
The spear phishing campaigns generally restarted in September to correspond with the start of the new academic year. The hackers have made numerous phishing sites that they use in the campaigns. Even if several of these sites are shutdown, plenty of numbers are utilized to make sure the campaigns can go on. This year, the hacking group is employing webweb pages hosted in Iran, which may impede efforts to take down the sites as a result of too little cooperation among Iran, the United States and Europe.
Spear phishing emails are extremely targeted and are delivered to quite few persons at specific company. The emails usually spoof university libraries and persuade individuals to click hyperlinks and get access to the university’s web pages.
The domains utilized in the campaign closely mimic the official websites made by the universities. As an example, attacks on Western University Canada utilize login.proxy1.lib.uwo.ca.sftt.cf rather than login.proxy1.lib.uwo.ca and Stony Brook University users are brought to the domain blackboard.stonybrook.ernn.me in place of blackboard.stonybrook.edu.
The threat group makes use of URL shortening services to create links to the phishing sites to disguise the true destination site. Malwarebytes, which found the newest campaign, stated that Silent Librarian is utilizing Cloudflare this year for many of their phishing hostnames to disguise the actual origin of the webweb pages, which are largely hosted in Iran.
The landing web pages on the phishing pages are digital carbon copies of those employed by the educational institutions being targeted, and so if a user gets on one of those websites and isn’t able to distinguish the wrong URL, there is a big probability that the group would be able to capture the login credentials entered.
This year’s campaign can be a lot more efficient. Lots of students and personnel are remote because of COVID-19, which may probably be exploited to steal a lot much more credentials and information.
The hacking group is confirmed to have done attacks on no less than 40 establishments and in excess of 140 educational organizations since 2013 and was determined to have ripped off greater than 30 TB of data files between 2013 and 2017. Malwarebytes mentioned that around a dozen universities were targeted in the most recent campaign, however, says merely a tiny sample of the email messages were intercepted and the phishing campaign could become much more extensive.