Silent Librarian

Silent Librarian is a group that has targeted research and proprietary data at universities, government agencies, and private sector companies worldwide since at least 2013. Members of Silent Librarian are known to have been affiliated with the Iran-based Mabna Institute which has conducted cyber intrusions at the behest of the government of Iran, specifically the Islamic Revolutionary Guard Corps (IRGC).[1][2][3]

ID: G0122
Associated Groups: TA407, COBALT DICKENS
Version: 1.0
Created: 03 February 2021
Last Modified: 21 April 2021

Associated Group Descriptions

Name Description
TA407

[4][3]

COBALT DICKENS

[5][6][4][3]

Techniques Used

Domain ID Name Use
Enterprise T1598 .003 信息钓鱼: Spearphishing Link

Silent Librarian has used links in e-mails to direct victims to credential harvesting websites designed to appear like the targeted organization's login page.[1][2][5][4][6][3]

Enterprise T1585 .002 建立账户: Email Accounts

Silent Librarian has established e-mail accounts to receive e-mails forwarded from compromised accounts.[1]

Enterprise T1594 搜索受害者拥有的网站

Silent Librarian has searched victim's websites to identify the interests and academic areas of targeted individuals and to scrape source code, branding, and organizational contact information for phishing pages.[1][2][4]

Enterprise T1589 .002 收集受害者身份信息: Email Addresses

Silent Librarian has collected e-mail addresses from targeted organizations from open Internet searches.[1]

.003 收集受害者身份信息: Employee Names

Silent Librarian has collected lists of names for individuals from targeted organizations.[1]

Enterprise T1608 .005 暂存能力: Link Target

Silent Librarian has cloned victim organization login pages and staged them for later use in credential harvesting campaigns. Silent Librarian has also made use of a variety of URL shorteners for these staged websites.[6][3][4]

Enterprise T1110 .003 暴力破解: Password Spraying

Silent Librarian has used collected lists of names and e-mail accounts to use in password spraying attacks against private sector targets.[1]

Enterprise T1078 有效账户

Silent Librarian has used compromised credentials to obtain unauthorized access to online accounts.[1]

Enterprise T1114 电子邮件收集

Silent Librarian has exfiltrated entire mailboxes from compromised accounts.[1]

.003 Email Forwarding Rule

Silent Librarian has set up auto forwarding rules on compromised e-mail accounts.[1]

Enterprise T1583 .001 获取基础设施: Domains

Silent Librarian has acquired domains to establish credential harvesting pages, often spoofing the target organization and using free top level domains .TK, .ML, .GA, .CF, and .GQ.[1][2][5][4][6][3]

Enterprise T1588 .002 获取能力: Tool

Silent Librarian has obtained free and publicly available tools including SingleFile and HTTrack to copy login pages of targeted organizations.[4][6]

.004 获取能力: Digital Certificates

Silent Librarian has obtained free Let's Encrypt SSL certificates for use on their phishing pages.[2][6]

References