Russian Spies Attacked Olympic Games With Malware

The GRU, Russia’s military intelligence service are accused of hacking officials and organisations at the 2020 Olympic and Paralympic Games which were were due to take place in Tokyo in th 2020 summer, before being postponed due to the Coronavirus epidemic. The attacks on the 2020 Summer Games are the latest in a campaign of Russian malicious cyber activity against the Olympic and Paralympic Games.

Many previous ascribed Russian cyber-attacks have been against the state institutions of Moscow’s political opponents, but some of this activity has been directed at the agencies conducting inquiries into Russian sports doping.

The British government has recently confirmed  the extent of GRU targeting of the 2018 Winter Olympic and Paralympic Games in Pyongyang, Republic of Korea, disguising itself as North Korean and Chinese hackers when it targeted the opening ceremony of the 2018 Winter Games. It went on to target broadcasters, a ski resort, Olympic officials and sponsors of the games in 2018. Foreign Secretary Dominic Raab said, “The GRU’s actions against the Olympic and Paralympic Games are cynical and reckless. We condemn them in the strongest possible terms…The UK will continue to work with our allies to call out and counter future malicious cyber-attacks”.

On 19th October, the US Department of Justice announced criminal charges against Russian military intelligence officers working for the GRU’s destructive cyber unit, also known by the code names Sandworm and VoodooBear. 

These charges are for conducting cyberattacks against the 2018 Winter Games and other cyber-attacks, including the 2018 spear phishing attacks against the UK’s Defence Science and Technology Laboratory. Britain is the first government to confirm details of the breadth of a previously reported Russian attempt to disrupt the 2018 winter Olympics and Paralympics in Pyongyang, South Korea. It declared with what it described as 95% confidence that the disruption of both the winter and summer Olympics was carried out remotely by the GRU unit 74455.

The GRU attacks have used some of the world’s most destructive malware known including: KillDisk and Industroyer, which each caused blackouts in UkraineNotPetya, which caused nearly $1 billion in losses to the three victims identified in the indictment and Olympic Destroyer, which disrupted thousands of computers used to support the 2018 Pyongyang Winter Olympics.  

The revelations potentially come at a difficult time for Donald Trump as the issue of Russian interference in US politics has reappeared in the presidential election campaign. 

President Trump’s personal lawyer Rudy Giuliani and the New York Post have been accused of unwittingly letting themselves be used by Russia to spread disinformation about the Democratic candidate, Joe Biden. The allegations emerged as officials in the United States were indicting the Russian intelligence operatives for interfering with the 2017 French presidential election, shutting down parts of Ukraine's power grid and launching cyber attacks against the 2018 Winter Olympics in South Korea.

The US indictment charges the defendants with conspiracy, computer hacking, wire fraud, aggravated identity theft, and false registration of a domain name.

GovUK:     US Dept. of Justice:      Guardian:        Brisbane Times:     Reuters:

You Might Also Read:

Reshaping The Future Of War With Malware:

 

« British Airways Breach
Voter Data Being Used To Disrupt US Election »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CERT Syria

CERT Syria

CERT Syria is the national Computer Emergency Response Team for Syria.

Protocol Policy Systems

Protocol Policy Systems

Protocol Policy Systems specialise in IT policy deployment and management systems that deliver compliance and secure computing environments.

SecuTech Solutions

SecuTech Solutions

SecuTech is a global leader in providing strong authentication and software licensing management solutions.

CyberGRX

CyberGRX

The CyberGRX Exchange and our risk assessments-as-a-service help Enterprises and Third Parties cost-effectively identify, prioritize and mitigate risk.

Araxxe

Araxxe

Araxxe delivers Revenue Assurance, End-to-End Billing Verification and Interconnect Fraud Detection solutions to communication companies worldwide.

ReliaQuest

ReliaQuest

ReliaQuest’s GreyMatter solution connects existing technology, people, and process – then equips security teams with unified, actionable insights across their entire environment.

Technology Ireland ICT Skillnet

Technology Ireland ICT Skillnet

Technology Ireland ICT Skillnet is a network of companies who collaborate to address skills needs within the technology sector.

GELLIFY

GELLIFY

GELLIFY is the first innovation platform dedicated to the high-tech B2B market, supporting start-ups and companies.

RIT Global Cybersecurity Institute

RIT Global Cybersecurity Institute

At RIT's Global Cybersecurity Institute, we educate and train cybersecurity professionals; develop new cybersecurity and AI-based knowledge for industry, academia, and government.

Lunio

Lunio

Lunio makes the internet a safer and more reliable place for everyone trying to grow their business by automatically getting rid of fake clicks, traffic, and leads on all ad platforms.

SoloKeys

SoloKeys

SoloKeys provides the first open-source FIDO2 security key: Protect your online accounts against unauthorized access by using the most secure login method.

Axitea

Axitea

Axitea designs, implements and develops the solutions best suited to its customers’ needs and their physical and cyber security requirements.

Cyber Insurance Academy

Cyber Insurance Academy

Cyber Insurance Academy was founded to provide insurance professionals with the knowledge needed to work in cyber-insurance and cyber-related insurance fields.

Eureka Security

Eureka Security

Eureka help organizations securely use any cloud data storage technology they need without having to compromise on security.

Think|Stack

Think|Stack

Think|Stack is a managed IT services company specializing in cloud and cybersecurity with human-centered design.

Canadian Cyber Threat Exchange (CCTX)

Canadian Cyber Threat Exchange (CCTX)

The CCTX is Canada’s not-for-profit, private-sector cyber threat sharing hub and collaboration centre.