IAC-WI

Main Menu

  • Home
  • News
  • Blog
  • Events
  • Gallery
    • Visuals
  • About
    • Contact

IAC-WI

  • Home
  • News
    • EU designates Iran's Revolutionary Guard a terror group

      February 1, 2026
      0
    • A Nation Past the Point of Return: Iran’s January 2026 Uprising and ...

      January 21, 2026
      0
    • IRGC Commander Admits to the Mass Killing of Civilians

      January 19, 2026
      0
    •  Wisconsin Iranian American sees avenue for hope,despite ongoing deadly Iranian protests

      January 17, 2026
      0
    • Iranian community reacts to reports of mass killings amid Iran protests

      January 16, 2026
      0
    • More than 400 influential women urge Iran to halt execution of female ...

      December 26, 2025
      0
    • Iran: UN Fact-Finding Mission alarmed by surge in repression and extraordinary spike ...

      November 2, 2025
      0
    • When History Spews the Past

      October 13, 2025
      0
    • UN experts appalled by unprecedented execution   spree in Iran with over 1000 ...

      October 2, 2025
      0
  • Blog
    • The women-led resistance the Iranian regime fears most

      February 27, 2026
      0
    • Don’t impose another Persian dictatoron a multinational Iran

      February 17, 2026
      0
    • The Iranian regime’s first victims are its own people

      February 5, 2026
      0
    • Neither Shah Nor Supreme Leader: Can Iran's Theocracy Survive a Nation in ...

      January 24, 2026
      0
    • The Untarnished Truth: Regime’s Forty-Year Battle to Discredit the MEK

      October 12, 2025
      0
    • Reza Pahlavi’s “Transition Plan”:  A Blueprint for Authoritarian Rule in Iran

      August 23, 2025
      0
    • The Regime’s Pen: How Iran’s Clerical Dictatorship Uses Friendly Journalists as Propaganda ...

      March 28, 2025
      0
    • Risking revival of unrest, Iran rulers tighten curbs on dissent

      July 21, 2023
      0
    • Time for Western Democracies to Stand with Iranian People

      June 14, 2023
      0
  • Events
  • Gallery
    • Visuals
  • About
    • Contact
News
Home›News›State-Sponsored Cyber Theft

State-Sponsored Cyber Theft

By IAC-WI
March 24, 2018
1773
0
Share:

Nine Iranians Charged in Massive Hacking Campaign on Behalf of Iran Government

FBI NEWS    |    March 23, 2018

Nine Iranian citizens – working at the behest of the government of Iran—have been charged in a massive computer hacking campaign that compromised U.S. and foreign universities, private companies, and U.S. government entities, including the Department of Labor and the Federal Energy Regulatory Commission.

The hackers were affiliated with the Mabna Institute, an Iran-based company created in 2013 for the express purpose of illegally gaining access to non-Iranian scientific resources through computer intrusions. Members of the institute were contracted by the Islamic Revolutionary Guard Corps—one of several entities within the Iranian government responsible for gathering intelligence—as well as other Iranian government clients.

During a more than four-year campaign, these state-sponsored hackers “compromised approximately 144 U.S.-based universities and 176 foreign universities in 21 countries,” said FBI Deputy Director David Bowdich during a press conference today at the Department of Justice in Washington to announce the indictments. When the FBI learned of the attacks, he said, “we notified the victims so they could take action to minimize the impact. And then we took action to find and stop these hackers.”

Initially, the cyber criminals used an elaborate spear-phishing campaign to target the e-mail accounts and computer systems of their victims, which in addition to the universities included nearly 50 domestic and foreign private-sector companies, the states of Hawaii and Indiana, and the United Nations.

According to the indictments unsealed today in a Manhattan federal court, the hackers stole more than 30 terabytes of academic data and intellectual property—roughly three times the amount of data contained in the print collection of the Library of Congress.

“Their primary goal was to obtain user names and passwords for the accounts of professors so they could gain unauthorized access and steal whatever kind of proprietary academic information they could get their hands on,” said a special agent who investigated the case from the FBI’s New York Division. “That information included access to library databases, white papers, journals, research, and electronic books. All that information and intellectual property was provided to the Iranian government,” he added.

Mabna Institute targeted more than 100,000 accounts of professors around the world and successfully compromised approximately 8,000 of those accounts. The campaign continued through at least December 2017. Although it is difficult to calculate a dollar loss amount, through the course of the conspiracy, U.S.-based universities spent approximately $3.4 billion to procure and access data that the Iranians accessed for free because of their criminal activity.

“The hackers did their homework,” the cyber agent said. They conducted online reconnaissance of professors to determine the individuals’ research interests and the academic articles they had published. Armed with that information, they sent spear-phishing e-mails to their targets—messages that appeared to be from professors at other universities.

Victim professors believed they were dealing with colleagues who had expressed an interest in academic articles. The e-mails tricked many of the professors to click on links that recorded their keystrokes when they signed into what they thought were their secure university domains but were actually bogus sites controlled by the hackers.

The Iranians targeted data across all fields of research and academic disciplines, including science and technology, engineering, social sciences, medical, and other professional fields.

In addition to targeting universities, the hackers gained access to employee e-mail accounts at nearly 50 private companies around the world—the majority of them U.S. firms. Among the U.S.-based victims were academic publishers, media and entertainment companies, technology companies, and investment firms. During that same period in 2016, the hackers also began conducting intrusions against various U.S. federal agencies and other organizations such as the United Nations.

This brute force technique involves collecting lists of names and e-mail accounts through open-source Internet searches and then guessing the users’ passwords, betting that some users never changed default company passwords or used common ones such as “password123.” Password spraying is such an unsophisticated technique that it can go undetected by company security networks. “They were flying under the radar,” said the cyber agent who investigated the case, “and the magnitude of their effort was remarkable.”

The tactic worked, providing hackers access to victims’ entire e-mail accounts. Now, in addition to academic data, the hackers were accessing companies’ trade secrets and sensitive U.S. government information.

The nine defendants, who all reside in Iran, have been charged with conspiracy to commit computer intrusions, wire fraud, unauthorized access of a computer, and aggravated identity theft.

Bowdich acknowledged that apprehending the Iranian cyber criminals presents a challenge, “but it’s not impossible.” He explained that the defendants might travel outside of Iran and be subject to arrest. “Where we can’t apprehend these individuals quickly,” he added, “we will resort to different methods—naming and shaming, sanctions, and a lot of publicity. We will keep at it,” he said, “because the FBI and our partners at the Department of Justice have a very long memory.”

https://www.fbi.gov/news/stories/nine-iranians-charged-in-hacking-scheme-032318

 

 

Previous Article

Liberate Iran: Demand Release of Detained Protesters

Next Article

John Bolton is a realist on Iran

0
Shares
  • 0
  • +
  • 0
  • 0
  • 0
  • 0

Related articles More from author

  • News

    For the New Administration, a Plan for Empowering Democratic Change in Iran

    December 6, 2024
    By IAC-WI
  • News

    To hit Iran, let’s back the democratic opposition, it worked in the Cold War

    February 5, 2024
    By IAC-WI
  • News

    Maryam Rajavi: What is the Fundamental Issue in Iran?

    June 23, 2025
    By IAC-WI
  • News

    Iran: International community must stand with women  and girls suffering intensifying oppression

    July 29, 2023
    By IAC-WI
  • News

    Six Protests in Iran over the Weekend

    August 31, 2019
    By IAC-WI
  • News

    Iran funds proxies with money freed up from the nuclear deal

    June 1, 2017
    By IAC-WI

You may interested

  • News

    The path forward on Iran and its proxy forces

  • News

    A Month of Shame and Humiliation as the West Seeks to Appease the Iranian Mullahs

  • News

    Iran Exploits the Global Financial System for Illicit Purposes, Treasury Official

Latest Tweets

Tweets by @OrgIAC
  • LATEST REVIEWS

  • TOP REVIEWS

Timeline

  • February 27, 2026

    The women-led resistance the Iranian regime fears most

  • February 17, 2026

    Don’t impose another Persian dictatoron a multinational Iran

  • February 5, 2026

    The Iranian regime’s first victims are its own people

  • February 1, 2026

    EU designates Iran’s Revolutionary Guard a terror group

  • January 24, 2026

    Neither Shah Nor Supreme Leader: Can Iran’s Theocracy Survive a Nation in Revolt?

Latest Comments

Find us on Facebook

About us

logo

Iranian American Community of Wisconsin (IAC-WI) is an all-volunteer, non-profit, serving the Iranian Americans in Wisconsin. We are inspired by Iranian people's desire for a democratic, secular, non-nuclear republic Iran that embraces a peaceful and prosperous Middle East.

Speaker Paul Ryan “Nowruz”

REP. GROTHMAN (R-WI)

Follow us

  • Contact
  • About Us
  • Home