IAC-WI

Main Menu

  • Home
  • News
  • Blog
  • Events
  • Gallery
    • Visuals
  • About
    • Contact

IAC-WI

  • Home
  • News
    • Iran: Seven protesters and dissidents at risk of imminent execution after four ...

      April 2, 2026
      0
    • Gingrich, Ex-Military Leaders Throw Support Behind Iran Opposition Group

      March 28, 2026
      0
    • NCRI Provisional Government Wins Backing Beyond 1,000 International Figures

      March 21, 2026
      0
    • EU designates Iran's Revolutionary Guard a terror group

      February 1, 2026
      0
    • A Nation Past the Point of Return: Iran’s January 2026 Uprising and ...

      January 21, 2026
      0
    • IRGC Commander Admits to the Mass Killing of Civilians

      January 19, 2026
      0
    •  Wisconsin Iranian American sees avenue for hope,despite ongoing deadly Iranian protests

      January 17, 2026
      0
    • Iranian community reacts to reports of mass killings amid Iran protests

      January 16, 2026
      0
    • More than 400 influential women urge Iran to halt execution of female ...

      December 26, 2025
      0
  • Blog
    • The Most Dangerous Kind of War Is One Without Strategy

      April 2, 2026
      0
    • The women-led resistance the Iranian regime fears most

      February 27, 2026
      0
    • Don’t impose another Persian dictatoron a multinational Iran

      February 17, 2026
      0
    • The Iranian regime’s first victims are its own people

      February 5, 2026
      0
    • Neither Shah Nor Supreme Leader: Can Iran's Theocracy Survive a Nation in ...

      January 24, 2026
      0
    • The Untarnished Truth: Regime’s Forty-Year Battle to Discredit the MEK

      October 12, 2025
      0
    • Reza Pahlavi’s “Transition Plan”:  A Blueprint for Authoritarian Rule in Iran

      August 23, 2025
      0
    • The Regime’s Pen: How Iran’s Clerical Dictatorship Uses Friendly Journalists as Propaganda ...

      March 28, 2025
      0
    • Risking revival of unrest, Iran rulers tighten curbs on dissent

      July 21, 2023
      0
  • Events
  • Gallery
    • Visuals
  • About
    • Contact
News
Home›News›State-Sponsored Cyber Theft

State-Sponsored Cyber Theft

By IAC-WI
March 24, 2018
1811
0
Share:

Nine Iranians Charged in Massive Hacking Campaign on Behalf of Iran Government

FBI NEWS    |    March 23, 2018

Nine Iranian citizens – working at the behest of the government of Iran—have been charged in a massive computer hacking campaign that compromised U.S. and foreign universities, private companies, and U.S. government entities, including the Department of Labor and the Federal Energy Regulatory Commission.

The hackers were affiliated with the Mabna Institute, an Iran-based company created in 2013 for the express purpose of illegally gaining access to non-Iranian scientific resources through computer intrusions. Members of the institute were contracted by the Islamic Revolutionary Guard Corps—one of several entities within the Iranian government responsible for gathering intelligence—as well as other Iranian government clients.

During a more than four-year campaign, these state-sponsored hackers “compromised approximately 144 U.S.-based universities and 176 foreign universities in 21 countries,” said FBI Deputy Director David Bowdich during a press conference today at the Department of Justice in Washington to announce the indictments. When the FBI learned of the attacks, he said, “we notified the victims so they could take action to minimize the impact. And then we took action to find and stop these hackers.”

Initially, the cyber criminals used an elaborate spear-phishing campaign to target the e-mail accounts and computer systems of their victims, which in addition to the universities included nearly 50 domestic and foreign private-sector companies, the states of Hawaii and Indiana, and the United Nations.

According to the indictments unsealed today in a Manhattan federal court, the hackers stole more than 30 terabytes of academic data and intellectual property—roughly three times the amount of data contained in the print collection of the Library of Congress.

“Their primary goal was to obtain user names and passwords for the accounts of professors so they could gain unauthorized access and steal whatever kind of proprietary academic information they could get their hands on,” said a special agent who investigated the case from the FBI’s New York Division. “That information included access to library databases, white papers, journals, research, and electronic books. All that information and intellectual property was provided to the Iranian government,” he added.

Mabna Institute targeted more than 100,000 accounts of professors around the world and successfully compromised approximately 8,000 of those accounts. The campaign continued through at least December 2017. Although it is difficult to calculate a dollar loss amount, through the course of the conspiracy, U.S.-based universities spent approximately $3.4 billion to procure and access data that the Iranians accessed for free because of their criminal activity.

“The hackers did their homework,” the cyber agent said. They conducted online reconnaissance of professors to determine the individuals’ research interests and the academic articles they had published. Armed with that information, they sent spear-phishing e-mails to their targets—messages that appeared to be from professors at other universities.

Victim professors believed they were dealing with colleagues who had expressed an interest in academic articles. The e-mails tricked many of the professors to click on links that recorded their keystrokes when they signed into what they thought were their secure university domains but were actually bogus sites controlled by the hackers.

The Iranians targeted data across all fields of research and academic disciplines, including science and technology, engineering, social sciences, medical, and other professional fields.

In addition to targeting universities, the hackers gained access to employee e-mail accounts at nearly 50 private companies around the world—the majority of them U.S. firms. Among the U.S.-based victims were academic publishers, media and entertainment companies, technology companies, and investment firms. During that same period in 2016, the hackers also began conducting intrusions against various U.S. federal agencies and other organizations such as the United Nations.

This brute force technique involves collecting lists of names and e-mail accounts through open-source Internet searches and then guessing the users’ passwords, betting that some users never changed default company passwords or used common ones such as “password123.” Password spraying is such an unsophisticated technique that it can go undetected by company security networks. “They were flying under the radar,” said the cyber agent who investigated the case, “and the magnitude of their effort was remarkable.”

The tactic worked, providing hackers access to victims’ entire e-mail accounts. Now, in addition to academic data, the hackers were accessing companies’ trade secrets and sensitive U.S. government information.

The nine defendants, who all reside in Iran, have been charged with conspiracy to commit computer intrusions, wire fraud, unauthorized access of a computer, and aggravated identity theft.

Bowdich acknowledged that apprehending the Iranian cyber criminals presents a challenge, “but it’s not impossible.” He explained that the defendants might travel outside of Iran and be subject to arrest. “Where we can’t apprehend these individuals quickly,” he added, “we will resort to different methods—naming and shaming, sanctions, and a lot of publicity. We will keep at it,” he said, “because the FBI and our partners at the Department of Justice have a very long memory.”

https://www.fbi.gov/news/stories/nine-iranians-charged-in-hacking-scheme-032318

 

 

Previous Article

Liberate Iran: Demand Release of Detained Protesters

Next Article

John Bolton is a realist on Iran

0
Shares
  • 0
  • +
  • 0
  • 0
  • 0
  • 0

Related articles More from author

  • News

    British Airways and Air France to Suspend Iran Service

    August 25, 2018
    By IAC-WI
  • News

    Why is Biden ignoring Iran’s influence in the Hamas attacks? 

    October 15, 2023
    By IAC-WI
  • News

    EU designates Iran’s Revolutionary Guard a terror group

    February 1, 2026
    By IAC-WI
  • News

    Iran: World must take meaningful action against bloody crackdown as death toll rises

    September 26, 2022
    By IAC-WI
  • News

    Hard-line former Tehran mayor named Iran parliament speaker

    June 3, 2020
    By IAC-WI
  • News

    Former Archbishop Rowan Williams: Religious minorities must be at heart of any Iran deal

    July 13, 2017
    By IAC-WI

You may interested

  • News

    Rouhani Government “Closed Seven Million” Websites in First Term

  • News

    Heidarian: Iran policy may positively impact human rights

  • News

    U.S. Middle East Commander Confirms That Iran Was Arming Houthis before Obama Nuclear Deal

Latest Tweets

Tweets by @OrgIAC
  • LATEST REVIEWS

  • TOP REVIEWS

Timeline

  • April 2, 2026

    The Most Dangerous Kind of War Is One Without Strategy

  • April 2, 2026

    Iran: Seven protesters and dissidents at risk of imminent execution after four men arbitrarily executed in secret within 24 hours

  • March 28, 2026

    Gingrich, Ex-Military Leaders Throw Support Behind Iran Opposition Group

  • March 21, 2026

    NCRI Provisional Government Wins Backing Beyond 1,000 International Figures

  • February 27, 2026

    The women-led resistance the Iranian regime fears most

Latest Comments

Find us on Facebook

About us

logo

Iranian American Community of Wisconsin (IAC-WI) is an all-volunteer, non-profit, serving the Iranian Americans in Wisconsin. We are inspired by Iranian people's desire for a democratic, secular, non-nuclear republic Iran that embraces a peaceful and prosperous Middle East.

Speaker Paul Ryan “Nowruz”

REP. GROTHMAN (R-WI)

Follow us

  • Contact
  • About Us
  • Home