London's School of Oriental and African Studies. Courtesy: SOAS
London's School of Oriental and African Studies. Courtesy: SOAS
London's School of Oriental and African Studies. Courtesy: SOAS
London's School of Oriental and African Studies. Courtesy: SOAS

Iranian hackers posed as British-based academic in failed espionage effort


  • English
  • Arabic

An Iranian group masqueraded as a British-based academic during a cyber espionage campaign.

The group also compromised the website belonging to the School of Oriental and African Studies (SOAS), University of London, to try to steal information.

The operation, which did not affected SOAS data systems, was uncovered by cyber security company Proofpoint. They called it "SpoofedScholars" and said it showed an increase in threat sophistication.

The attackers, sometimes referred to as "Charming Kitten" and believed to be linked to the Iranian state, were also willing to engage in real-time conversations with their targets, who were mainly in the US and UK.

In early 2021, emails claiming to come from a "senior teaching and research fellow" at SOAS invited people to join an online conference called The US Security Challenges in the Middle East.

The emails, sent from a Gmail address, were not from the academic but an espionage group believed to be linked to the Iranian Islamic Revolutionary Guard Corps (IRGC).

Once a conversation was established, the target was sent a "registration link" hosted by a website that was compromised by the attackers.

It belonged to SOAS radio, an independent online radio station and production company based at SOAS.

This link then offered a means to log on using email providers Google, Yahoo, Microsoft, iCloud, Outlook, AOL, mail.ru, Email, and Facebook, which could then capture the passwords and usernames.

Stealing credentials is not new, but the use of a real website to do so is.

"It is highly unusual and more sophisticated for this group," said Sherrod DeGrippo, senior director, threat research and detection for Proofpoint.

The communications between the fake academic and the target could be lengthy to build trust before sending the registration link. In some cases, the sender asked to connect by phone with the recipients to discuss the invitation.

In one instance, the recipient asked for and received more detail by email, with the attackers then suggesting they connect by videoconference.

That cyber spies were trying to connect in real time with individuals by phones and videoconferencing to talk rather than just engaging by email was also unusual, suggesting confidence in their skills in English and in impersonation.

It was not clear if conversations took place.

The operation was highly focused, involving fewer than 10 target organisations, Proofpoint said. In some cases, there were multiple individuals inside those organisations.

They were primarily from three groups:

  • Senior think tank personnel working on the Middle East
  • Journalists focused on the region
  • Academics, including senior professors

It is thought likely that they were selected because they might have information on foreign policy of countries towards Iran, negotiations about Iran's nuclear programme, or information about Iranian dissidents.

This fits with earlier activity by the same espionage group, which Proofpoint called TA453.

"TA453's continued interest in these targets demonstrates an Iranian commitment to user cyber operations to collect intelligence in support of intelligence priorities," Ms DeGrippo said.

A few months after the initial campaign began in January, another SOAS academic's identity was used by the group to try to recruit for a webinar.

The group also seemed interested in mobile phone numbers, possibly to use to deliver malicious software or to use to against others.

SOAS said no personal information was obtained and its data systems were not affected.

It said the compromised radio website was separate from the official SOAS website and not part of any of its academic domains.

"Once we became aware of the dummy site earlier this year, we immediately remedied and reported the breach in the normal way. We have reviewed how this took place and taken steps to further improve protection of these sort of peripheral systems," the university said.

Proofpoint said it cannot be completely sure the IRGC was behind the campaign but the tactics, techniques and the targeting give it "high confidence" that it was responsible.

The company said it has worked with the authorities on victim notification but that TA453 was likely to continue to try to pass itself off as academics.

Proofpoint recommended that academics, journalists, and think tank scholars should verify the identity of anyone offering them opportunities, especially if approached online.

Ten tax points to be aware of in 2026

1. Domestic VAT refund amendments: request your refund within five years

If a business does not apply for the refund on time, they lose their credit.

2. E-invoicing in the UAE

Businesses should continue preparing for the implementation of e-invoicing in the UAE, with 2026 a preparation and transition period ahead of phased mandatory adoption. 

3. More tax audits

Tax authorities are increasingly using data already available across multiple filings to identify audit risks. 

4. More beneficial VAT and excise tax penalty regime

Tax disputes are expected to become more frequent and more structured, with clearer administrative objection and appeal processes. The UAE has adopted a new penalty regime for VAT and excise disputes, which now mirrors the penalty regime for corporate tax.

5. Greater emphasis on statutory audit

There is a greater need for the accuracy of financial statements. The International Financial Reporting Standards standards need to be strictly adhered to and, as a result, the quality of the audits will need to increase.

6. Further transfer pricing enforcement

Transfer pricing enforcement, which refers to the practice of establishing prices for internal transactions between related entities, is expected to broaden in scope. The UAE will shortly open the possibility to negotiate advance pricing agreements, or essentially rulings for transfer pricing purposes. 

7. Limited time periods for audits

Recent amendments also introduce a default five-year limitation period for tax audits and assessments, subject to specific statutory exceptions. While the standard audit and assessment period is five years, this may be extended to up to 15 years in cases involving fraud or tax evasion. 

8. Pillar 2 implementation 

Many multinational groups will begin to feel the practical effect of the Domestic Minimum Top-Up Tax (DMTT), the UAE's implementation of the OECD’s global minimum tax under Pillar 2. While the rules apply for financial years starting on or after January 1, 2025, it is 2026 that marks the transition to an operational phase.

9. Reduced compliance obligations for imported goods and services

Businesses that apply the reverse-charge mechanism for VAT purposes in the UAE may benefit from reduced compliance obligations. 

10. Substance and CbC reporting focus

Tax authorities are expected to continue strengthening the enforcement of economic substance and Country-by-Country (CbC) reporting frameworks. In the UAE, these regimes are increasingly being used as risk-assessment tools, providing tax authorities with a comprehensive view of multinational groups’ global footprints and enabling them to assess whether profits are aligned with real economic activity. 

Contributed by Thomas Vanhee and Hend Rashwan, Aurifer

Get stories like this one in your inbox each morning.

Sign up for our daily newsletter here

Updated: July 27, 2021, 7:11 AM