Hackers Strike Winter Olympics

Winter Olympics officials have confirmed the games were hit by a cyber attack during the opening ceremony, but have refused to confirm rumours in Pyeongchang that Russia was responsible.

Shortly before the ceremony, the official Pyeongchang 2018 site stopped working, with users unable to access information or print tickets for events. The website was only normalised 12 hours later. 

Winter Olympics organisers are investigating how the opening ceremony was the target of a cyber-attack after severe technological problems and the WiFi stopped working.Reporters at the Pyeongchang Olympic Stadium noticed that the Internet WiFi stopped working shortly before the ceremony while the televisions and WiFi at the main press centre also stopped. 

Pyeongchang 2018 was also forced to shut its website, with users unable to print their tickets for events. The website was only normalised at 8am on Saturday 10th Feb, 12 hours later.

Fears over a potential cyber-attack, particularly from North Korea, were prominent in the build-up to the Games. 
A spokesperson for Pyeongchang 2018 said they “cannot speculate” on the reason behind the problems but did not rule out claims that their servers were deliberately targeted by hackers.

In a statement, the organising committee said the glitches “impacted some of our noncritical systems last night for a few hours
“These have not disrupted any events, or had any effect on the safety and security of any athletes or spectators,” yeongchang 2018 added.

“All competitions are running as planned and the systems are working at the expected level. Our technology partners and our experienced team of ICT experts are working to maintain the systems.

“We are currently investigating the root cause and will share further information.”

A spokesperson later added that the problems had affected “several areas” across the Games but they were confident systems would be fully operational as soon as possible. There were also reports of people receiving malicious emails from potential hackers.

Guardian:       Guardian

You Might Also Read: 

High Tech Police Tool Up For Winter Olympics:

Winter Olympics Targeted:

 

 

« NHS Trusts Failed Cyber Security Assessment
What Does Brexit Mean For Britain's Spies? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

StickyMinds

StickyMinds

StickyMinds is the web's first interactive testing community exclusively engaged in improving software quality throughout the software development lifecycle.

International Conference on Information Systems Security & Privacy (ICISSP)

International Conference on Information Systems Security & Privacy (ICISSP)

The ICISSP event is a meeting point for researchers and practitioners to address security and privacy challenges concerning information systems.

InteliSecure

InteliSecure

InteliSecure offer Professional Services, Security Assessments and Managed Services for data and threat protection.

Aves Netsec

Aves Netsec

Aves is a deceptive security system for enterprises who want to capture, observe and mitigate bad actors in their internal network.

Cyxtera Technologies

Cyxtera Technologies

Cyxtera offers powerful, secure IT infrastructure capabilities paired with agile, dynamic software-defined security.

FTAPI Software

FTAPI Software

FTAPI SecuTransfer is a software solution for end-to-end encrypted data exchange of large and sensitive data with customers and partners.

PBOSecure

PBOSecure

PBOSecure is a dynamic and progressive IT consultancy company specializing in IT and Industrial Control System (ICS) security.

Sternum

Sternum

Sternum provides reliable and effective endpoint security for any IoT device, using robust technology and seamless integration.

UnderDefense

UnderDefense

UnderDefense provides cyber resiliency consulting and technology-enabled services to anticipate, manage and defend against cyber threats.

Netlinkz

Netlinkz

Netlinkz has developed the Virtual Secure Network (VSN) overlay technology platform, a breakthrough in connectivity security, speed, and simplicity.

Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection (HIP) is the premier educational forum for identity-centric cybersecurity practitioners charged with defending hybrid cloud environments.

Def-Logix

Def-Logix

Def-Logix was founded in 2008 to help solve cyber threats being experienced by government agencies of the United States.

Acrisure

Acrisure

Acrisure is powered by the best of human and high-tech and offers insurance, reinsurance, real estate, cyber and more solutions to millions of clients around the world.

Core4ce

Core4ce

Core4ce is a mission-oriented company that serves as a trusted partner to the national security community.

Post-Quantum Cryptography Alliance (PQCA)

Post-Quantum Cryptography Alliance (PQCA)

The alliance seeks to address cryptographic security challenges posed by quantum computing by producing high-assurance software implementations of standardized algorithms.

Toro Solutions

Toro Solutions

Toro provide managed security & consultancy to keep governments, businesses & society resilient in the space where cyber, physical & people security converge.