Winter Olympics Targeted

Hackers have attempted to steal sensitive data from groups involved with next month's Winter Olympics, cyber-security firm McAfee said. 

The report found malware-email were sent organisations linked to the Pyeongchang Games. It did not identify those responsible, but said more attacks tied to the upcoming Olympics were likely. 
In similar past attacks, hackers tried to obtain passwords and financial data.

Casting Net Wide
McAfee said a number of groups associated with the Olympics had received malicious emails, including several affiliated with ice hockey. "The majority of these organisations had some association with the Olympics, either in providing infrastructure or in a supporting role," the security firm said.  "The attackers appear to be casting a wide net with this campaign." 

The emails were sent from a Singapore IP address and told readers to open a text document in Korean. 
McAfee said the hackers were trying to trick recipients into believing the emails had come from South Korea's National Counter-Terrorism Center - which at the time was in the process of conducting anti-terror drills in the region.
In some cases, the hackers used a technique in known as steganography which hides malware in text and images. 

McAfee echoed recent warnings from University of California researchers to expect more cyber-attacks targeting major sporting events. "With the upcoming Olympics, we expect to see an increase in cyber-attacks using Olympics-related themes," the security firm said.

BBC:

You Might Also Read:

Rio Olympics Hacking Threats:

Meet The Fancy Bears:
 

« A Plausible Domestic Hack To Beware Of
Iran’s Cyberwar Could Infiltrate Your Mailbox »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Guardtime

Guardtime

Guardtime's Black Lantern platform provides real-time cybersecurity and data-centric asset protection.

SOTI

SOTI

SOTI is an industry leader in Enterprise Mobility Management (EMM).

Soracom

Soracom

Soracom offers secure, scalable, cloud-native connectivity developed specifically for the Internet of Things.

Privitar

Privitar

Privitar is leading the development and adoption of privacy engineering technology enabling our customers to innovate and leverage data with an uncompromising approach to data privacy.

Maritime Cybersecurity Center (MCC)

Maritime Cybersecurity Center (MCC)

Maritime Cybersecurity Center is a not-for-profit organization focused on regional cybersecurity excellence and readiness, with a special emphasis on the maritime community.

Infosec Partners

Infosec Partners

Whether you’re looking for complete managed security or an on-call expert advisor, we offer a range of managed security services to complement your internal team or primary outsource partner.

Global EPIC

Global EPIC

Global EPIC is an international cybersecurity initiative designed to combat growing world challenges by facilitating global collaboration in the field of cyber security.

JupiterOne

JupiterOne

JupiterOne is the security product that is changing how organizations manage and secure their software defined assets.

Rostelecom

Rostelecom

Rostelecom is Russia’s largest integrated provider of digital services and solutions, covering all market segments including consumer, governmental and private organizations.

Nucleon Security

Nucleon Security

Nucleon Endpoint Detection and Response EDR is the most effective way to protect the value created by your organization against any threat.

Iterasec

Iterasec

Iterasec provides a full range of security services to hacker-proof your products and make software engineering process secure by design.

OwnBackup

OwnBackup

OwnBackup proactively prevents you from losing mission-critical data and metadata with automated backups and rapid, stress-free recovery.

Cyber Defence Solutions (CDS)

Cyber Defence Solutions (CDS)

Cyber Defence Solutions is a cyber and privacy Consultancy with extensive experience in the development and implementation of cyber and data security solutions to your assets.

Clear Skye

Clear Skye

Clear Skye, an Identity Access and Management (IAM) software company, reimagines enterprise identity access and risk management software to make a complicated problem easier to manage.

McAfee

McAfee

McAfee is a worldwide leader in online protection. We’re focused on protecting people, not devices. Our solutions adapt to our customers’ needs and empower them to confidently experience life online.

MAUSHIELD

MAUSHIELD

MAUSHIELD is the national platform for sharing cyber threat information and intelligence that can help organisations to improve their cybersecurity posture, minimize risks and prevent cyber-attacks.