Russian Spies Attacked Olympic Games With Malware

The GRU, Russia’s military intelligence service are accused of hacking officials and organisations at the 2020 Olympic and Paralympic Games which were were due to take place in Tokyo in th 2020 summer, before being postponed due to the Coronavirus epidemic. The attacks on the 2020 Summer Games are the latest in a campaign of Russian malicious cyber activity against the Olympic and Paralympic Games.

Many previous ascribed Russian cyber-attacks have been against the state institutions of Moscow’s political opponents, but some of this activity has been directed at the agencies conducting inquiries into Russian sports doping.

The British government has recently confirmed  the extent of GRU targeting of the 2018 Winter Olympic and Paralympic Games in Pyongyang, Republic of Korea, disguising itself as North Korean and Chinese hackers when it targeted the opening ceremony of the 2018 Winter Games. It went on to target broadcasters, a ski resort, Olympic officials and sponsors of the games in 2018. Foreign Secretary Dominic Raab said, “The GRU’s actions against the Olympic and Paralympic Games are cynical and reckless. We condemn them in the strongest possible terms…The UK will continue to work with our allies to call out and counter future malicious cyber-attacks”.

On 19th October, the US Department of Justice announced criminal charges against Russian military intelligence officers working for the GRU’s destructive cyber unit, also known by the code names Sandworm and VoodooBear. 

These charges are for conducting cyberattacks against the 2018 Winter Games and other cyber-attacks, including the 2018 spear phishing attacks against the UK’s Defence Science and Technology Laboratory. Britain is the first government to confirm details of the breadth of a previously reported Russian attempt to disrupt the 2018 winter Olympics and Paralympics in Pyongyang, South Korea. It declared with what it described as 95% confidence that the disruption of both the winter and summer Olympics was carried out remotely by the GRU unit 74455.

The GRU attacks have used some of the world’s most destructive malware known including: KillDisk and Industroyer, which each caused blackouts in UkraineNotPetya, which caused nearly $1 billion in losses to the three victims identified in the indictment and Olympic Destroyer, which disrupted thousands of computers used to support the 2018 Pyongyang Winter Olympics.  

The revelations potentially come at a difficult time for Donald Trump as the issue of Russian interference in US politics has reappeared in the presidential election campaign. 

President Trump’s personal lawyer Rudy Giuliani and the New York Post have been accused of unwittingly letting themselves be used by Russia to spread disinformation about the Democratic candidate, Joe Biden. The allegations emerged as officials in the United States were indicting the Russian intelligence operatives for interfering with the 2017 French presidential election, shutting down parts of Ukraine's power grid and launching cyber attacks against the 2018 Winter Olympics in South Korea.

The US indictment charges the defendants with conspiracy, computer hacking, wire fraud, aggravated identity theft, and false registration of a domain name.

GovUK:     US Dept. of Justice:      Guardian:        Brisbane Times:     Reuters:

You Might Also Read:

Reshaping The Future Of War With Malware:

 

« British Airways Breach
Voter Data Being Used To Disrupt US Election »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cybersecurity Philippines CERT (CSP-CERT)

Cybersecurity Philippines CERT (CSP-CERT)

Cybersecurity Philippines CERT is the national Computer Emergency Response Team for the Philippines.

Latvian Information & Communications Technology Association (LIKTA)

Latvian Information & Communications Technology Association (LIKTA)

LIKTA brings together leading Latvian companies, organizations and professionals in the field of Information & Communications Technology

AppSec Labs

AppSec Labs

AppSec Labs specialise in application security. Our mission is to raise awareness in the software development world to the importance of integrating software security across the development lifecycle.

Vintegris

Vintegris

Vintegris are a Certification Authority and manufacturer of innovative systems and applications for the full cycle of digital identity.

totemo

totemo

Totemo offers solutions for the secure exchange of business information.

Trustless Computing Association (TCA)

Trustless Computing Association (TCA)

TCA is is a non-profit organization promoting the creation and wide availability of IT and AI technologies that are radically more secure and accountable than today’s state of the art.

Barbara IoT

Barbara IoT

Barbara is an industrial device platform specifically designed for IoT deployments.

Lifespan Technology

Lifespan Technology

Lifespan Technology provides the full range of IT Asset Disposition services. This includes hardware recycling and disposal, data destruction, and hardware resale.

Fairfirst Insurance

Fairfirst Insurance

Fairfirst Cyber Insurance protects your business assets against the complexity of cyber threats.

NetApp Excellerator

NetApp Excellerator

NetApp Excellerator is NetApp’s global start-up program that aims to fuel innovation by partnering with deep-tech start-ups.

Cybersecurity Maturity Model Certification Center of Excellence (CMMC COE)

Cybersecurity Maturity Model Certification Center of Excellence (CMMC COE)

CMMC COE is an IT-AAC sponsored public–private partnership that will be the focal point for entities seeking to achieve Cybersecurity Maturity Model Certification.

Vala Secure

Vala Secure

Vala Secure is a cybersecurity and compliance consultancy that always stays ahead of regulations, future threats and ever-changing security environments.

Progress Partners

Progress Partners

Progress Partners is a corporate advisory firm that works with buyers and sellers of emerging growth companies to complete M&A or private placement transactions. Our sectors include cybersecurity.

Saiflow

Saiflow

SaiFlow provides a tailor-made cybersecurity solution for Electric Vehicles Charging Infrastructure (EVCI), Distributed Energy Resources (DERs) and energy networks and assets.

CyberKinetics

CyberKinetics

CyberKinetics specializes in cloud-based services and solutions for federal agencies and commercial clients with compliance mandates.

Forensic IT

Forensic IT

Forensic IT is a specialised cyber security firm with expertise in Digital Forensics and Incident Response (DFIR).