Editor
OCD Tech
Category
Cybersecurity
Date
April 26, 2025

Last week the United States Department of Justice (DOJ) issued a press release announcing the arrest of a cyber-criminal that had stolen $750,000 from the University of California San Diego (UCSD) through a carefully executed spear-phishing campaign.  As reported by Naked Security-Sophos, the criminal Amil Hassan Raage, worked in partnership with co-conspirators in Kenya to execute the cyber-heist.

In late July 2018, a UCSD employee received an email from Dell requesting the University direct it’s outstanding payments owed to Dell to a specific bank account; the email seemed legitimate and UCSD did have a payment due to Dell, so the transfer was initiated.  Unfortunately, the email requesting payment was not sent by Dell, it was sent from a fake account masquerading as a real Dell email domain. It should come as no surprise then that the bank account numbers provided did not belong to Dell, they were Amil’s personal Wells Fargo bank account details.

UCSD was not the only school Amil and his crew hit. Another undisclosed school in Pennsylvania was taken for $123,643.77 adding up to a total of over $870,000.00 in stolen funds. Instances such as these illustrate that phishing attacks are still a major concern for all organizations and that phishing can be used for more than just stealing credentials and installing malware. In this case, a specially-crafted email was all that was required to swindle two higher education organizations out of hundreds of thousands of dollars. While there is constant news of sophisticated attackers finding novel ways of breaking into organizations, its critical to remember the serious risks associated with spear-phishing and other social engineering attacks because now, as always, an organization’s users often represent the biggest attack surface.

Also, note in the DOJ press release: If your organization falls victim to an email-comprise scam the FBI recommends you immediately call your bank to see if they can freeze your funds before it’s too late.

Colleges and universities in the U.S. invest millions of dollars into security solutions (like firewalls, two-factor authentication, and SEM/SIEM solutions).  For the security experts here at OCD Tech, this most recent incident with UCSD points to a reoccurring truth: security solutions are only as effective as the people using them allow for. Why purchase and install firewalls only to implement insufficient security-controls on that equipment? Should senior executives (privileged account holders) really be given the option to disable two-factor authentication?  A SEM/SIEM solution in and of itself merely provides a data report. Utilize an experienced IT-auditor to glean valuable insight and actionable intelligence from your SEM/SIEM tool.

Contact OCD Tech today to learn how yourorganization can start implementing the best-practices in security awarenesstraining.

[wpforms id="10103" title="false" description="false"]

Audit. Security. Assurance.

IT Audit | Cybersecurity | IT Assurance | IT Security Consultants – OCD Tech is a technology consulting firm serving the IT security and consulting needs of businesses in Boston (MA), Braintree (MA) and across New England. We primarily serve Fortune 500 companies including auto dealers, financial institutions, higher education, government contractors, and not-for-profit organizations with SOC 2 reporting, CMMC readiness, IT Security Audits, Penetration Testing and Vulnerability Assessments. We also provide dark web monitoring, DFARS compliance, and IT general controls review.

Contact Info

OCD Tech

25 BHOP, Suite 407, Braintree MA, 02184

844-623-8324

https://ocd-tech.com

Follow Us

Videos

Check Out the Latest Videos From OCD Tech!

Services

SOC Reporting Services
SOC 2 ® Readiness Assessment
SOC 2 ®
SOC 3 ®
SOC for Cybersecurity ®
IT Advisory Services
IT Vulnerability Assessment
Penetration Testing
Privileged Access Management
Social Engineering
WISP
General IT Controls Review
IT Government Compliance Services
CMMC
DFARS Compliance
FTC Safeguards vCISO

Industries

Financial Services
Government
Enterprise
Auto Dealerships

Two U.S. Colleges scammed for over $870,000 in Spear-Phishing Attack

By  
OCD Tech
August 15, 2019
4
min read
Share this post

Last week the United States Department of Justice (DOJ) issued a press release announcing the arrest of a cyber-criminal that had stolen $750,000 from the University of California San Diego (UCSD) through a carefully executed spear-phishing campaign.  As reported by Naked Security-Sophos, the criminal Amil Hassan Raage, worked in partnership with co-conspirators in Kenya to execute the cyber-heist.

In late July 2018, a UCSD employee received an email from Dell requesting the University direct it’s outstanding payments owed to Dell to a specific bank account; the email seemed legitimate and UCSD did have a payment due to Dell, so the transfer was initiated.  Unfortunately, the email requesting payment was not sent by Dell, it was sent from a fake account masquerading as a real Dell email domain. It should come as no surprise then that the bank account numbers provided did not belong to Dell, they were Amil’s personal Wells Fargo bank account details.

UCSD was not the only school Amil and his crew hit. Another undisclosed school in Pennsylvania was taken for $123,643.77 adding up to a total of over $870,000.00 in stolen funds. Instances such as these illustrate that phishing attacks are still a major concern for all organizations and that phishing can be used for more than just stealing credentials and installing malware. In this case, a specially-crafted email was all that was required to swindle two higher education organizations out of hundreds of thousands of dollars. While there is constant news of sophisticated attackers finding novel ways of breaking into organizations, its critical to remember the serious risks associated with spear-phishing and other social engineering attacks because now, as always, an organization’s users often represent the biggest attack surface.

Also, note in the DOJ press release: If your organization falls victim to an email-comprise scam the FBI recommends you immediately call your bank to see if they can freeze your funds before it’s too late.

Colleges and universities in the U.S. invest millions of dollars into security solutions (like firewalls, two-factor authentication, and SEM/SIEM solutions).  For the security experts here at OCD Tech, this most recent incident with UCSD points to a reoccurring truth: security solutions are only as effective as the people using them allow for. Why purchase and install firewalls only to implement insufficient security-controls on that equipment? Should senior executives (privileged account holders) really be given the option to disable two-factor authentication?  A SEM/SIEM solution in and of itself merely provides a data report. Utilize an experienced IT-auditor to glean valuable insight and actionable intelligence from your SEM/SIEM tool.

Contact OCD Tech today to learn how yourorganization can start implementing the best-practices in security awarenesstraining.

[wpforms id="10103" title="false" description="false"]

Share this post
OCD Tech