Foreign Office Minister condemns criminal actors based in Iran for cyber-attacks against UK universities

National Security

March 23
15:21 2018

Today the US indicted nine employees of the Mabna Institute based in Iran for a global hacking campaign targeting universities, including in the UK.

Foreign Office Minister for Cyber, Lord Tariq Ahmad of Wimbledon said:

The UK Government judges that the Mabna Institute based in Iran was responsible for a hacking campaign targeting universities around the world.

By stealing intellectual property from universities, these hackers attempted to make money and gain technological advantage at our expense.

We welcome the US indictments. It demonstrates our willingness and ability to respond collectively to cyber-attacks using all levers at our disposal.

The focus on universities is a timely reminder that all organisations are potential targets and need to constantly strive for the best possible cyber security.

Todays action is a further step demonstrating that malicious cyber activity will not go unpunished. Mabna Institute employees can no longer travel freely, curtailing their career prospects outside of Iran.

Notes for editors

The UKs National Cyber Security Centre assesses with high confidence that the Mabna Institute are almost certainly responsible for a multi-year Computer Network Exploitation (CNE) campaign targeting universities in the UK, the US, as well as other Western nations, primarily for the purposes of intellectual property (IP) theft. Todays action comes after US law enforcement indicted other employees of the Mabna Institute in November 2017 for the hack and leak operation against TV company HBO.

Further information

Media enquiries

For journalists

Related Articles


  1. We don't have any comments for this article yet. Why not join in and start a discussion.

Write a Comment

Your name:
Your email:

Post my comment

Recent Comments

Follow Us on Twitter

Share This

Enjoyed this? Why not share it with others if you've found it useful by using one of the tools below: