20 Universities targeted by “Shadow Academy” hackers

Hackers identified after the discovery of a fake Louisiana State University student portal

man reading computer code

Louisiana State University (LSU) and 19 other universities worldwide have fallen victim to a spate of phishing campaigns that could be related to attacks carried out by an Iranian-based company on U.S. agencies, universities, and businesses.

According to a report by cybersecurity firm RiskIQ, the attacks took place between July and October this year and uncovered 20 unique targets in Australia, Afghanistan, the UK, and the US.  The attacks “used similar tactics, techniques, and procedures (TTPs) as Mabna Institute,” an Iranian company the FBI says was created for illegally gaining access "to non-Iranian scientific resources through computer intrusions." 

Mabna, also known as "Silent Librarian,” tried to compromise university students and faculty and harvest credentials by impersonating university library resources via domain shadowing.  However, RiskIQ did not find enough evidence to link the campaigns to Mabna, so it decided to name hackers identified during this research as "Shadow Academy."

The first target identified from RiskIQ crawl data was an LSU-themed student portal login page. According to researchers, it became clear that threat actors were leveraging domain shadowing, the same technique Silent Librarian used.

In addition to LSU, the attacks targeted 14 other US educational institutions. These include University of Arizona, Southeastern Louisiana University, University of Massachusetts Amherst, Manhattan College, Rochester Institute of Technology, Bowling Green State University, Wright State University, Texas State University, University of North Texas, Abilene Christian University, The Evergreen State College, Western Washington University and the University of Washington.

Of the universities targeted, 37% saw phishing campaigns impersonating libraries, 63% saw campaigns dressed up as student portals, and 11% were financial aid-themed attacks.

The attacks initially focused on stealing domain account credentials. They then register unauthorized subdomains to point traffic to malicious servers or, in this case, create phishing pages.

“These subdomains are challenging to detect because they are associated with well-known domains, often don't follow any discernible pattern, and don't affect the parent domain or anything hosted on that domain,” said researchers.

Researchers suggested the hackers timed the development of malicious infrastructure to take advantage of the first few days of class, which can be a chaotic time that overwhelms IT staff. 

“However, having access to the infrastructure that comprises the web helps analysts note similarities between threat campaigns are observable behavior by threat actors to track them to identify and investigate threats during heightened periods of attacker activity,” researchers said.

Featured Resources

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Security best practices for PostgreSQL

Securing data with PostgreSQL

Download now

Transform your MSP business into a money-making machine

Benefits and challenges of a recurring revenue model

Download now

The care and feeding of cloud

How to support cloud infrastructure post-migration

Watch now

Recommended

Hackers leak data from dark web marketplace
cyber security

Hackers leak data from dark web marketplace

9 Apr 2021
How to encrypt files and folders in Windows 10
encryption

How to encrypt files and folders in Windows 10

9 Apr 2021
The definitive guide to IT security
Whitepaper

The definitive guide to IT security

9 Apr 2021
Evidence suggests REvil behind Harris Federation ransomware attack
ransomware

Evidence suggests REvil behind Harris Federation ransomware attack

9 Apr 2021

Most Popular

Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
Hackers are using fake messages to break into WhatsApp accounts
instant messaging (IM)

Hackers are using fake messages to break into WhatsApp accounts

8 Apr 2021
Data belonging to 500 million LinkedIn users found for sale on hacker marketplace
hacking

Data belonging to 500 million LinkedIn users found for sale on hacker marketplace

8 Apr 2021