Threats Feed|TA407|Last Updated 24/01/2025|AuthorCertfa Radar|Publish Date14/10/2019

TA407’s Phishing Campaigns Continue Targeting Universities Globally

  • Actor Motivations: Exfiltration,Financial Gain
  • Attack Vectors: Compromised Credentials,Spear Phishing
  • Attack Complexity: Low
  • Threat Risk: Low Impact/High Probability

Threat Overview

TA407 (Silent Librarian) has consistently targeted universities, particularly in the US, Europe, and North America, in credential phishing campaigns. Using tailored phishing pages mimicking university login portals, the group compromises accounts to steal academic data, intellectual property, and user credentials. Between 2013 and 2017, TA407 caused over $3.4 billion in intellectual property losses, affecting thousands of university accounts worldwide. The group exploits Freenom domains and various URL shorteners, including university-based services, to distribute phishing links and expand their reach within academia.

Detected Targets

TypeDescriptionConfidence
SectorGovernment Agencies and Services
Verified
SectorUniversity
Verified
RegionUnited States
Verified
RegionEuropean Countries
Verified

Extracted IOCs

  • aill[.]nl
  • atll[.]tk
  • azll[.]cf
  • azll[.]tk
  • blibo[.]ga
  • cill[.]ml
  • clll[.]cf
  • clll[.]tk
  • cllt[.]cf
  • cllt[.]tk
  • cnen[.]cf
  • cvve[.]cf
  • eill[.]cf
  • eill[.]ga
  • eill[.]nl
  • elll[.]cf
  • euve[.]tk
  • fill[.]cf
  • flil[.]cf
  • flll[.]cf
  • illl[.]cf
  • ills[.]cf
  • itll[.]tk
  • jlll[.]cf
  • liba[.]gq
  • libb[.]ga
  • libdo[.]cf
  • libe[.]cf
  • libe[.]ga
  • libf[.]ga
  • libk[.]ga
  • libm[.]ga
  • libn[.]gq
  • librt[.]ml
  • libt[.]ga
  • libver[.]ml
  • libw[.]gq
  • llif[.]cf
  • llii[.]xyz
  • llit[.]cf
  • lliz[.]cf
  • lllib[.]cf
  • llli[.]cf
  • llli[.]nl
  • lllt[.]cf
  • lzll[.]cf
  • mlibo[.]ml
  • ncce[.]cf
  • nlib[.]ml
  • nlll[.]cf
  • nlll[.]tk
  • ntil[.]cf
  • ntll[.]cf
  • ntll[.]tk
  • nuec[.]cf
  • rvna[.]cf
  • sitt[.]cf
  • ssll[.]cf
  • stll[.]tk
  • tlit[.]cf
  • tlll[.]cf
  • tlll[.]tk
  • ttit[.]cf
  • ttll[.]cf
  • ulll[.]tk
  • venc[.]cf
  • visc[.]cf
  • vtll[.]cf
  • xill[.]cf
  • zlll[.]tk
download

Tip: 70 related IOCs (0 IP, 70 domain, 0 URL, 0 email, 0 file hash) to this threat have been found.

Overlaps

COBALT DICKENSCOBALT DICKENS Targets Global Universities in Persistent Phishing Campaign

Source: Secureworks - September 2019

Detection (38 cases): aill[.]nl, azll[.]cf, blibo[.]ga, cill[.]ml, clll[.]tk, cnen[.]cf, cvve[.]cf, eill[.]cf, eill[.]ga, eill[.]nl, elll[.]cf, fill[.]cf, flil[.]cf, flll[.]cf, illl[.]cf, ills[.]cf, jlll[.]cf, liba[.]gq, libb[.]ga, libe[.]ga, libf[.]ga, libk[.]ga, libm[.]ga, libt[.]ga, libver[.]ml, llii[.]xyz, llit[.]cf, llli[.]nl, lllib[.]cf, lzll[.]cf, mlibo[.]ml, nlll[.]cf, ntll[.]tk, nuec[.]cf, stll[.]tk, tlll[.]cf, ulll[.]tk, vtll[.]cf

Hint: Overlaps are extracted automatically by examining the IOCs associated with all indexed threats and actors.

About Affiliation
TA407