Incident: Iranian Hackers Target Universities Worldwide in Massive Cyber Attack

Published Date: 2018-03-23

Postmortem Analysis
Timeline 1. The software failure incident of the Iranian hackers stealing university data happened when the Mabna Institute was established in 2013 [69268].
System The software failure incident reported in the article [69268] involved a cyber attack carried out by the Mabna Institute, targeting universities and organizations worldwide. The systems that failed in this incident were: 1. Email accounts of professors worldwide 2. Computer systems of 320 universities globally 3. Intellectual property and data of universities and companies These systems failed due to the cyber attack orchestrated by the Mabna Institute, leading to the compromise of email accounts and theft of valuable intellectual property and data.
Responsible Organization 1. The Mabna Institute and its founders were responsible for causing the software failure incident reported in the article [69268].
Impacted Organization 1. Universities worldwide, including 144 US universities and 176 universities in 21 foreign countries [69268].
Software Causes 1. The software cause of the failure incident was hacking carried out by the Mabna Institute, targeting the email accounts of professors worldwide and compromising about 8,000 of them [69268].
Non-software Causes 1. The Mabna Institute, an Iranian company, and 10 individuals were accused of cyber attacks on universities worldwide, involving stealing intellectual property and data [69268].
Impacts 1. The software failure incident led to the theft of 31 terabytes of valuable intellectual property and data from universities worldwide, affecting the security and confidentiality of sensitive information [69268]. 2. The hackers compromised the email accounts of over 100,000 professors globally, with approximately 8,000 accounts being breached, potentially leading to unauthorized access to academic and research-related communications [69268]. 3. The cyber attacks targeted 144 US universities and 176 universities in 21 foreign countries, impacting the academic and research institutions' data security and integrity [69268]. 4. The incident resulted in the indictment of nine individuals for related crimes, with the two founders of the Mabna Institute being among those sanctioned and facing potential extradition if they travel outside of Iran [69268].
Preventions 1. Implementing robust cybersecurity measures such as multi-factor authentication, encryption, and intrusion detection systems could have prevented the hacking incident [69268]. 2. Regular security audits and vulnerability assessments could have helped in identifying and patching potential weaknesses in the systems, thereby preventing unauthorized access [69268]. 3. Providing comprehensive cybersecurity training to employees and users to raise awareness about phishing attacks and social engineering tactics could have prevented the hackers from gaining access to sensitive data [69268].
Fixes 1. Implementing robust cybersecurity measures to prevent unauthorized access and data breaches [69268]. 2. Conducting regular security audits and vulnerability assessments to identify and address potential weaknesses in the system [69268]. 3. Enhancing employee training on cybersecurity best practices to prevent social engineering attacks and phishing attempts [69268].
References 1. US Justice Department 2. US Treasury Department 3. US Deputy Attorney General Rod Rosenstein 4. Reuters 5. News agency AFP 6. Iranian Revolutionary Guard Corps

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident having happened again at one_organization: The Mabna Institute, an Iranian company, was accused of hacking at least 320 universities worldwide, stealing valuable intellectual property and data. This incident involving cyber attacks on universities and companies is a significant software failure incident that has happened within the same organization [69268]. (b) The software failure incident having happened again at multiple_organization: The Mabna Institute, in addition to targeting 144 US universities, also carried out cyber attacks on 176 universities in 21 foreign countries, including the UK, Germany, Canada, Israel, and Japan. This indicates that the software failure incident of cyber attacks has happened at multiple organizations globally [69268].
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase can be seen in the article where the Mabna Institute, an Iranian company, is accused of hacking into hundreds of universities worldwide and stealing valuable intellectual property and data. The firm was established in 2013, and US prosecutors believe it was designed to help Iranian research organizations steal information. This indicates a failure in the design phase where the system was developed with the intention of carrying out cyber attacks on universities and organizations [69268]. (b) The software failure incident related to the operation phase is evident in the article where the Mabna Institute targeted the email accounts of more than 100,000 professors worldwide, compromising about 8,000 of them. This operation involved the hackers infiltrating computer systems and stealing intellectual property, indicating a failure in the operation phase where the system was misused for malicious activities [69268].
Boundary (Internal/External) within_system, outside_system (a) within_system: The software failure incident reported in the article is primarily attributed to the actions of the Mabna Institute, an Iranian company accused of hacking into hundreds of universities worldwide and stealing valuable intellectual property and data. The Mabna Institute, established in 2013, is believed to have been designed to help Iranian research organizations steal information. The cyber attacks on universities, companies, and parts of the US government were carried out by targeting email accounts of professors worldwide, compromising thousands of them [69268]. (b) outside_system: The software failure incident can also be seen as originating from outside the system, specifically from the actions of the Iranian government and the Iranian Revolutionary Guard Corps. The US authorities described the cyber attacks as being done "at the behest of the Iranian government" [69268].
Nature (Human/Non-human) human_actions (a) The software failure incident in this case is attributed to human actions, specifically the actions of Iranian hackers associated with the Mabna Institute. The hackers were accused of carrying out cyber attacks on hundreds of universities worldwide, stealing valuable intellectual property and data totaling 31 terabytes. The hackers targeted email accounts of professors, compromising about 8,000 of them [69268]. The failure was a result of deliberate actions taken by individuals involved in the cyber attacks.
Dimension (Hardware/Software) software (a) The articles do not mention any software failure incident related to hardware issues. (b) The software failure incident mentioned in the articles is related to cyber attacks conducted by the Mabna Institute, an Iranian company, and 10 individuals. They are accused of hacking into 320 universities worldwide, stealing 31 terabytes of intellectual property and data. The hackers targeted email accounts of professors, compromising about 8,000 of them. This incident is described as one of the largest state-sponsored hacking sprees to be prosecuted, indicating a software failure due to contributing factors originating in malicious software and cyber attacks [69268].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident in this case is malicious. The Mabna Institute, an Iranian company, is accused of hacking into hundreds of universities worldwide and stealing valuable intellectual property and data totaling 31 terabytes. The hackers targeted email accounts of over 100,000 professors globally, compromising about 8,000 of them. The US authorities described this cyber attack as one of the largest state-sponsored hacking sprees to be prosecuted, with many of the intrusions believed to be done at the behest of the Iranian government and the Iranian Revolutionary Guard Corps [69268].
Intent (Poor/Accidental Decisions) unknown The software failure incident reported in the article [69268] was not due to poor decisions or accidental decisions. Instead, it was a deliberate cyber attack orchestrated by the Mabna Institute, accused of hacking into hundreds of universities worldwide to steal valuable intellectual property and data. The intent behind this incident was malicious, with the hackers targeting email accounts of professors to compromise them and steal information for their own gain.
Capability (Incompetence/Accidental) development_incompetence, unknown (a) The software failure incident related to development incompetence is evident in the case of the Mabna Institute hacking incident. The Mabna Institute, established in 2013, was believed to be designed to help Iranian research organizations steal information by carrying out cyber attacks on numerous universities worldwide [69268]. This indicates a deliberate and planned effort by individuals with professional competence in hacking and cyber attacks. (b) The software failure incident related to accidental factors is not mentioned in the provided article.
Duration unknown The software failure incident described in the article does not align with the typical definitions of a temporary or permanent software failure. The incident reported in the article is related to a cyber attack carried out by the Mabna Institute, an Iranian company, on numerous universities worldwide. This incident involves hacking activities, data theft, and cyber espionage rather than a traditional software failure as a result of technical issues or bugs. Therefore, the concepts of temporary or permanent software failure do not apply in this context.
Behaviour other (a) crash: The software failure incident in the article does not involve a crash where the system loses state and does not perform any of its intended functions [69268]. (b) omission: The failure in this incident is not due to the system omitting to perform its intended functions at an instance(s) [69268]. (c) timing: The software failure incident is not related to the system performing its intended functions correctly but too late or too early [69268]. (d) value: The failure in this incident is not due to the system performing its intended functions incorrectly [69268]. (e) byzantine: The behavior of the software failure incident in the article does not involve the system behaving erroneously with inconsistent responses and interactions [69268]. (f) other: The software failure incident in the article involves a cyber attack where the Mabna Institute is accused of hacking universities worldwide to steal intellectual property and data. This behavior falls under the category of a deliberate malicious act rather than a system failure as described in options (a) to (e) [69268].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence property, non-human, theoretical_consequence, unknown (a) unknown (b) unknown (c) unknown (d) People's material goods, money, or data was impacted due to the software failure [69268] (e) unknown (f) Non-human entities were impacted due to the software failure [69268] (g) unknown (h) There were potential consequences discussed of the software failure that did not occur [69268] (i) unknown
Domain information, knowledge (a) The failed system was intended to support the information industry, specifically universities and research organizations. The Mabna Institute, accused of hacking universities worldwide, targeted the email accounts of professors to steal intellectual property and data [69268].

Sources

Back to List