20 Universities targeted by “Shadow Academy” hackers

Hackers identified after the discovery of a fake Louisiana State University student portal

man reading computer code

Louisiana State University (LSU) and 19 other universities worldwide have fallen victim to a spate of phishing campaigns that could be related to attacks carried out by an Iranian-based company on U.S. agencies, universities, and businesses.

According to a report by cybersecurity firm RiskIQ, the attacks took place between July and October this year and uncovered 20 unique targets in Australia, Afghanistan, the UK, and the US.  The attacks “used similar tactics, techniques, and procedures (TTPs) as Mabna Institute,” an Iranian company the FBI says was created for illegally gaining access "to non-Iranian scientific resources through computer intrusions." 

Mabna, also known as "Silent Librarian,” tried to compromise university students and faculty and harvest credentials by impersonating university library resources via domain shadowing.  However, RiskIQ did not find enough evidence to link the campaigns to Mabna, so it decided to name hackers identified during this research as "Shadow Academy."

The first target identified from RiskIQ crawl data was an LSU-themed student portal login page. According to researchers, it became clear that threat actors were leveraging domain shadowing, the same technique Silent Librarian used.

In addition to LSU, the attacks targeted 14 other US educational institutions. These include University of Arizona, Southeastern Louisiana University, University of Massachusetts Amherst, Manhattan College, Rochester Institute of Technology, Bowling Green State University, Wright State University, Texas State University, University of North Texas, Abilene Christian University, The Evergreen State College, Western Washington University and the University of Washington.

Of the universities targeted, 37% saw phishing campaigns impersonating libraries, 63% saw campaigns dressed up as student portals, and 11% were financial aid-themed attacks.

The attacks initially focused on stealing domain account credentials. They then register unauthorized subdomains to point traffic to malicious servers or, in this case, create phishing pages.

“These subdomains are challenging to detect because they are associated with well-known domains, often don't follow any discernible pattern, and don't affect the parent domain or anything hosted on that domain,” said researchers.

Researchers suggested the hackers timed the development of malicious infrastructure to take advantage of the first few days of class, which can be a chaotic time that overwhelms IT staff. 

“However, having access to the infrastructure that comprises the web helps analysts note similarities between threat campaigns are observable behavior by threat actors to track them to identify and investigate threats during heightened periods of attacker activity,” researchers said.

Featured Resources

Choosing a collaboration platform

Eight questions every IT leader should ask

Download now

Performance benchmark: PostgreSQL/ MongoDB

Helping developers choose a database

Download now

Customer service vs. customer experience

Three-step guide to modern customer experience

Download now

Taking a proactive approach to cyber security

A complete guide to penetration testing

Download now

Recommended

HackBoss malware is using Telegram to steal cryptocurrency from other hackers
cryptocurrencies

HackBoss malware is using Telegram to steal cryptocurrency from other hackers

16 Apr 2021
Mastering endpoint security implementation
Security

Mastering endpoint security implementation

16 Apr 2021
US, UK say Russia was behind SolarWinds hack
cyber attacks

US, UK say Russia was behind SolarWinds hack

16 Apr 2021
Biden looks to shore up the electrical grid’s cyber security
Security

Biden looks to shore up the electrical grid’s cyber security

15 Apr 2021

Most Popular

Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

8 Apr 2021
UK exploring plans to launch its own digital currency
digital currency

UK exploring plans to launch its own digital currency

19 Apr 2021