Hackers Strike Winter Olympics

Winter Olympics officials have confirmed the games were hit by a cyber attack during the opening ceremony, but have refused to confirm rumours in Pyeongchang that Russia was responsible.

Shortly before the ceremony, the official Pyeongchang 2018 site stopped working, with users unable to access information or print tickets for events. The website was only normalised 12 hours later. 

Winter Olympics organisers are investigating how the opening ceremony was the target of a cyber-attack after severe technological problems and the WiFi stopped working.Reporters at the Pyeongchang Olympic Stadium noticed that the Internet WiFi stopped working shortly before the ceremony while the televisions and WiFi at the main press centre also stopped. 

Pyeongchang 2018 was also forced to shut its website, with users unable to print their tickets for events. The website was only normalised at 8am on Saturday 10th Feb, 12 hours later.

Fears over a potential cyber-attack, particularly from North Korea, were prominent in the build-up to the Games. 
A spokesperson for Pyeongchang 2018 said they “cannot speculate” on the reason behind the problems but did not rule out claims that their servers were deliberately targeted by hackers.

In a statement, the organising committee said the glitches “impacted some of our noncritical systems last night for a few hours
“These have not disrupted any events, or had any effect on the safety and security of any athletes or spectators,” yeongchang 2018 added.

“All competitions are running as planned and the systems are working at the expected level. Our technology partners and our experienced team of ICT experts are working to maintain the systems.

“We are currently investigating the root cause and will share further information.”

A spokesperson later added that the problems had affected “several areas” across the Games but they were confident systems would be fully operational as soon as possible. There were also reports of people receiving malicious emails from potential hackers.

Guardian:       Guardian

You Might Also Read: 

High Tech Police Tool Up For Winter Olympics:

Winter Olympics Targeted:

 

 

« NHS Trusts Failed Cyber Security Assessment
What Does Brexit Mean For Britain's Spies? »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

IDpendant

IDpendant

IDpendant offers a wide range of services, including authentication technology, client security products, single sign on systems, encryption solutions, card and mobile device management systems.

Threat Intelligence

Threat Intelligence

Threat Intelligence is a specialist security company providing penetration testing, threat intelligence, incident response and training services.

CipherMail

CipherMail

CipherMail provides email security products which allow organizations world wide to automatically protect their email against unauthorized access both in transit and at rest.

Cyber Observer

Cyber Observer

Cyber Observer’s team specializes in providing corporate officers with comprehensive, visual, real-time performance overview, critical security control (CSC) analysis.

Span

Span

Span designs, develops and maintains information systems based on advanced technological solutions of global IT leaders.

EOL IT Services

EOL IT Services

EOL IT Services is the UK’s most accredited provider of IT Asset Disposal (ITAD), Lifecycle Services and Data Destruction.

Highland Capital Partners

Highland Capital Partners

Highland Capital Partners is an early stage venture capital firm focused on category-defining businesses in consumer and enterprise technology, including cybersecurity.

Secberus

Secberus

SECBERUS creates cloud security technology to help organizations stay secure & compliant in the public cloud.

Focal Point

Focal Point

We aspire to be the focal point for Medium and Small size companies providing 24/7 cyber security advice, services and solutions.

SessionGuardian

SessionGuardian

SessionGuardian (formerly SecureReview) is the world's first and only technology which ensures second-by-second biometric identity verification of your remote user, from log on to log off.

Communicate Technology

Communicate Technology

Communicate Technology are IT, telecoms and cyber-security specialists, keeping over 500 businesses and 50,000 users connected and secure across the UK.

Bytes Technology Group

Bytes Technology Group

Bytes is a leading provider of world-class IT solutions. Our growing portfolio of services includes cloud, security, licensing, SAM, storage, virtualisation and managed services.

Inspectiv

Inspectiv

Inspectiv offers a turn-key solution to continuously identify security vulnerabilities and provide security assurance.

The IoT Academy

The IoT Academy

The IoT Academy is a reputed Ed-Tech Institute that provides training in emerging technologies such as embedded systems, the Internet of Things (IoT), Data Science and many more.

Swick Technologies (SWICKtech)

Swick Technologies (SWICKtech)

SWICKtech offer IT managed services to increase IT security, stability, and performance for your organization.

CrashPlan

CrashPlan

CrashPlan provides peace of mind through secure, scalable, and straightforward endpoint data backup.