Here's how to watch the 2018 Winter Olympics live stream

Brunilde Fioravanti
Febbraio 15, 2018

"Attackers are smart, and to make malicious emails more enticing for the victims, a frequent trick is to tie them to an event that is now going on", Kirda previously told TechRepublic.

"We are still investigating and the team is continuing to work to ensure the systems remain robust", the agency added.

Chloe Kim competes in the women's snowboard halfpipe qualification at the Olympic Winter Games PyeongChang 2018 on February 12, 2018 in PyeongChang, South Korea.

In a blog post, Talos said it had identified malware samples used in the attack with "moderate confidence".

"The tool appears to be created to propagate within a specific computer network and destabilize and disrupt systems by deleting recovery information and boot configurations", Hultquist told CyberScoop. "This is something we have witnessed previously with BadRabbit and Nyetya".

The malware "dropper" used those credentials and installed Web browser and operating system credential stealing malware to harvest other users' logins and passwords to assist in spreading itself across the network. Realistically, the wind plays its role and it's a short downhill so realistically it makes it really tough for us.

The malware will force connected computers to crash, become unresponsive and otherwise not function properly.

"The sole goal of this malware is to perform destruction of the host and leave the computer system offline", the researchers said. Technical forensic evidence obtained by researchers shows the attackers purposefully restrained Olympic Destroyer by underwriting it with parameters that isolate each infection; unlike the NotPetya or WannaCry incidents before it. Wi-Fi not working at the stadium also hindered reporters working on site.

"We can confirm that the technology issues experienced on Friday night were caused by a cyber-attack", the International Olympic Committee told Geek in an emailed statement.

Who was behind the cyberattack?

None of the three firms identified the source of the attack. The hacker group has previously been linked to the DNC hack.

CrowdStrike also said it observed credential harvesting activity against an worldwide sporting organisation in November and December 2017 that it attributed to Fancy Bear "with medium confidence". Organizers say the massive total is 10,000 more than were given to athletes at the Vancouver 2010 and Sochi 2014 games.

The conditions have cause both concern and debate - particularly after the International Ski Federation put off some skiing events, but not the women's snowboard slopestyle, which saw dozens of riders fall on their runs two days ago. "It is clear attacks are ongoing and are likely to continue throughout the duration of the games".

Altre relazioniGrafFiotech

Discuti questo articolo

Segui i nostri GIORNALE