0xHACKED: Brown University Accounts Distributing Phishing Emails

“Ido, we will address this compromise with Miss. XXXX directly. Thank you for notifying us,” said the last email received from Miss. Patricia Falcon, Information Security Policy & Awareness Specialist at the University of Brown, Rhode Island. Suspected spear phishing campaign attempting to steal users’ credentials by sending phishing emails masquerading as Google recovery.

From the beginning:

When the first email arrived in one of my Gmail inboxes I thought it was just another phishing scam – report it and toss it into the trash. But then I thought, hold on… it made its way through all the Gmail spam filters, so why not take a quick look.

That was on 5 October, an email with a “NO REPLY.” alias in the Sender field was marked as unread and after clicking it, a Google recovery email opened. Next to its subject was a profile picture of a person I didn’t know. Well, I thought, hackers don’t tend to post their pictures on their own phishing emails. So I checked the details and it was an email from Brown University, located in Rhode Island, United States.

Could it be a spear phishing campaign against the university?

On second thoughts, it was only one email. Maybe the person was lured by some appealing content into clicking a link where he simply entered his username and password to a fake form that hijacked his credentials.

First incident: Yet another phishing email

Browsing through the body of the email, I got the impression that it was very well written and was not some first-timer’s attempt. Not many obvious mistakes. Can you spot any?

0xHACKED: Brown University Accounts Distributing Phishing Emails

Fake email from Brown University compromised account

  1. Funny – the old Google logo is used.
  2. First line after “Hello” has a space before the first sentence starts.
  3. “The Google Accounts team“? Who are they? And a capital ‘T’, surely?
  4. Close my account because info is missing and then verify existing info to continue using it? Where’s the logic in that?
  5. The button should say “Verify Account Details” not “Verify Email Address”, right?

We could spot some more, but that’s enough for now.

With all that in mind, the picture is the first thing that immediately draws your attention. It’s because this is a valid Gmail account of a person named Ph****p P**g. This person works for Brown University and email servers are actually hosted by Google. That means that the compromised account can initially send phishing emails to any Gmail user account without them hitting the spam folder – not until it’s being reported as spam.

After trying to notify Mr. P**g in every possible medium he existed in online, I finally gave up. We reported the phishing attempt registered as an short link that redirects to a domain named after a song by a Nigerian rapper, and hosted on GoDaddy.

Two domain names have been identified so far; however, the IP address indicates massive use of phishing and even kits available for direct download and use. One of the domains found was the initial redirection URL from the malicious email short link and the other one was embedded in a PHP form action attribute, located within the phishing website’s /index.html page, masquerading as a legitimate Google recovery form.

0xHACKED: Brown University Accounts Distributing Phishing Emails

Fake Google recovery form

Here is the chain of events from the victim’s point of view:

  1. Compromised Gmail account sends a message to the Gmail victim – Not spam.
  2. Victim clicks the fake “Verify” button and the embedded short link executes.
  3. Short link becomes a long link redirecting to hxxp://shokiti-bobo-crew[.]net/<your ip>/index.html. (Fake Gmail Recovery)
  4. The page sends a fake Javascript alert() that the victim’s Gmail account has been logged out.
  5. Clicking OK reveals a form similar to the Gmail login page, only with additional fields, such as recovery email, phone and date of birth.
  6. Submitting the PHP form sends the data to another malicious server – hxxp://owo-ni-boiz[.]net/auth.php
  7. After submitting the form, the page redirects back to Gmail – which was logged in the whole time – persuading the victim that the fake logout alert() message from step (4) was real.

The second [Co]incident

20 October, 8:00AM, another email arrived. To my surprise, it had the same origin – – but a different victim.

It was now a woman. Her name is Q***h T**n, a former employee of the university and a current LinkedIn employee. Her account was immediately deleted after we reported the scam to LinkedIn.

0xHACKED: Brown University Accounts Distributing Phishing Emails

LinkedIn employee account deleted after Gmail account was compromised in the attack

This email was different, suggesting that our threat actors have many templates at their disposal. However, the domains were the same. Since she is a former employee, it might mean her account was taken over while her account was disabled. It’s possible that the attackers took over a server that has modified privileges and they have managed to reactivate the dormant accounts of former employees.

0xHACKED: Brown University Accounts Distributing Phishing Emails

Second fake email to come from a former Brown University employee

Issues spotted:

  1. No “Hello” this time – straight to the point.
  2. Non-US spelling: “take a look at the help centre or watch the video
  3. Capital ‘R’ in ‘required’ is missing from subject.
  4. Russian? <img alt=”Логотип (Google Диск)” border=”0″>
  5. under “to bcc” there is a tiny button that was supposed to display a Google logo. Instead, it is broken and the HTML attributes are in Russian. “Logotip (Google Disk)”, says the alt.
  6. Lastly, this redirection is using, not

This time the navigation is the other way around. If the first instance was redirecting to hxxp://shokiti-bobo-crew[.]net/ to submit a form that was sent to hxxp://owo-ni-boiz[.]net/, then this time the address hxxp://owo-ni-boiz[.]net/, redirects to hxxp://shokiti-bobo-crew[.]net/mission/xconactc.php

We were the first to submit the URL to Virus Total, meaning it’s still fresh. No anti-viruses identified the link as malicious.


OWO NI BOYS and SHOKITI BOBO are both songs by Nigerian rappers. This suggests that the attackers are influenced by rappers such as Olamide and Kida Kudz or are trying to create this false sense for analysts.

The second piece of information was the Russian Google Drive logo found in second incident. Both creates assumptions about threat actors way of thinking, either by injecting false information or by making terrible mistakes.

One thing is for sure – Brown University is suffering from a few compromised accounts and this attack is still active.

0xHACKED: Brown University Accounts Distributing Phishing Emails

Your email address will not be published. Required fields are marked *


  1. Linda

    Our second e-address (also thankfully protected by Kaspersky) has received numerous emails, purporting to be from many different legitimate entities (Fingerhut, Medicare, etc.) with the extensions: (Eastern Kentucky U), (state of Montana), and at least one other.

    I wasn’t sure who to report this to so have done nothing yet. Your report on Brown U was an “aha” moment. Thanks.

    1. Ido Naor

      Hi Linda,

      Thank you for contacting Kaspersky Lab. We will be happy to help.
      Please find my Twitter account handle at the top of the page. Contact me and we can engage to remediate the incident you’re experiencing.




Lazarus targets defense industry with ThreatNeedle

In mid-2020, we realized that Lazarus was launching attacks on the defense industry using the ThreatNeedle cluster, an advanced malware cluster of Manuscrypt (a.k.a. NukeSped). While investigating this activity, we were able to observe the complete life cycle of an attack, uncovering more technical details and links to the group’s other campaigns.

Sunburst backdoor – code overlaps with Kazuar

While looking at the Sunburst backdoor, we discovered several features that overlap with a previously identified backdoor known as Kazuar. Our observations shows that Kazuar was used together with Turla tools during multiple breaches in past years.

Lazarus covets COVID-19-related intelligence

As the COVID-19 crisis grinds on, some threat actors are trying to speed up vaccine development by any means available. We have found evidence that the Lazarus group is going after intelligence that could help these efforts by attacking entities related to COVID-19 research.

Sunburst: connecting the dots in the DNS requests

We matched private and public DNS data for the SUNBURST-malware root C2 domain with the CNAME records, to identify who was targeted for further exploitation. In total, we analyzed 1722 DNS records, leading to 1026 unique target name parts and 964 unique UIDs.

Subscribe to our weekly e-mails

The hottest research right in your inbox