Hackers Strike Winter Olympics

Winter Olympics officials have confirmed the games were hit by a cyber attack during the opening ceremony, but have refused to confirm rumours in Pyeongchang that Russia was responsible.

Shortly before the ceremony, the official Pyeongchang 2018 site stopped working, with users unable to access information or print tickets for events. The website was only normalised 12 hours later. 

Winter Olympics organisers are investigating how the opening ceremony was the target of a cyber-attack after severe technological problems and the WiFi stopped working.Reporters at the Pyeongchang Olympic Stadium noticed that the Internet WiFi stopped working shortly before the ceremony while the televisions and WiFi at the main press centre also stopped. 

Pyeongchang 2018 was also forced to shut its website, with users unable to print their tickets for events. The website was only normalised at 8am on Saturday 10th Feb, 12 hours later.

Fears over a potential cyber-attack, particularly from North Korea, were prominent in the build-up to the Games. 
A spokesperson for Pyeongchang 2018 said they “cannot speculate” on the reason behind the problems but did not rule out claims that their servers were deliberately targeted by hackers.

In a statement, the organising committee said the glitches “impacted some of our noncritical systems last night for a few hours
“These have not disrupted any events, or had any effect on the safety and security of any athletes or spectators,” yeongchang 2018 added.

“All competitions are running as planned and the systems are working at the expected level. Our technology partners and our experienced team of ICT experts are working to maintain the systems.

“We are currently investigating the root cause and will share further information.”

A spokesperson later added that the problems had affected “several areas” across the Games but they were confident systems would be fully operational as soon as possible. There were also reports of people receiving malicious emails from potential hackers.

Guardian:       Guardian

You Might Also Read: 

High Tech Police Tool Up For Winter Olympics:

Winter Olympics Targeted:

 

 

« NHS Trusts Failed Cyber Security Assessment
What Does Brexit Mean For Britain's Spies? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

APMG International (APM Group)

APMG International (APM Group)

APM Group is a global accreditation, certification and examination body specializing in certification schemes for individuals, organizations and software.

IntelliGO Networks

IntelliGO Networks

IntelliGO Networks is a cybersecurity company focused on Managed Detection and Response (MDR).

Military Cyber Professionals Association (MCPA)

Military Cyber Professionals Association (MCPA)

MCPA are a team of Soldiers, Sailors, Airmen, Marines, Veterans and others interested in the development of the American military cyber profession.

CSI

CSI

CSI is a Managed Service Provider (MSP) delivering Hybrid Multi-Cloud, Data Protection, and Cyber Security solutions to highly regulated industries.

iFluids Engineering

iFluids Engineering

iFluids Engineering is a leading engineering consulting and risk management firm providing a full range of services including Cyber Security for Industrial Control Systems.

Evanston Technology Partners (ETP)

Evanston Technology Partners (ETP)

ETP provides services and solutions to enable and transform businesses in the areas of cybersecurity, data protection, and efficient operations practices.

FraudWatch International

FraudWatch International

FraudWatch has been protecting client brands around the world since 2003, and are the leaders in online brand protection from phishing, malware, social media and mobile apps impersonation.

Cyber Range Malaysia

Cyber Range Malaysia

With Cyber Range Malaysia organizations can train their security professionals in empirically valid cyber war-gaming scenarios necessary to develop IT staff skills and instincts for defensive action.

SecureThings

SecureThings

SecureThings focus is to provide guidance and technology to secure connected vehicles in order to build end-to-end security for the automotive industry.

Venkon

Venkon

Venkon provides effective and unique solutions to cyber-security threats and IT compliance requirements of your organization.

Aura

Aura

Aura is a mission driven technology company dedicated to creating a safer internet for everyone. We’re making comprehensive digital security that's simple to understand and easy to use.

LBMC

LBMC

LBMC is a professional services solutions provider in accounting and finance, human resources, technology, risk and information security, and wealth advisory services.

Devolutions

Devolutions

Devolutions make best-in-class Privileged Access Management, Password Management, and Remote Connection Management solutions available to ALL organizations — including SMBs.

Vancord

Vancord

Vancord is an information and security technology company that works in collaboration with clients to support their infrastructure and data security needs for today and tomorrow.

Silent Push

Silent Push

Silent Push maps all internet-facing infrastructure with searchable, advanced attributes, generating early indicators of potential threats that are tailored to your environment.

RightCue Assurance

RightCue Assurance

RightCue Assurance identify opportunities for improvement in the Information Security for your organisation and work with you to reduce cyber risk.