Winter Olympics Targeted

Hackers have attempted to steal sensitive data from groups involved with next month's Winter Olympics, cyber-security firm McAfee said. 

The report found malware-email were sent organisations linked to the Pyeongchang Games. It did not identify those responsible, but said more attacks tied to the upcoming Olympics were likely. 
In similar past attacks, hackers tried to obtain passwords and financial data.

Casting Net Wide
McAfee said a number of groups associated with the Olympics had received malicious emails, including several affiliated with ice hockey. "The majority of these organisations had some association with the Olympics, either in providing infrastructure or in a supporting role," the security firm said.  "The attackers appear to be casting a wide net with this campaign." 

The emails were sent from a Singapore IP address and told readers to open a text document in Korean. 
McAfee said the hackers were trying to trick recipients into believing the emails had come from South Korea's National Counter-Terrorism Center - which at the time was in the process of conducting anti-terror drills in the region.
In some cases, the hackers used a technique in known as steganography which hides malware in text and images. 

McAfee echoed recent warnings from University of California researchers to expect more cyber-attacks targeting major sporting events. "With the upcoming Olympics, we expect to see an increase in cyber-attacks using Olympics-related themes," the security firm said.

BBC:

You Might Also Read:

Rio Olympics Hacking Threats:

Meet The Fancy Bears:
 

« A Plausible Domestic Hack To Beware Of
Iran’s Cyberwar Could Infiltrate Your Mailbox »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

LogRhythm

LogRhythm

LogRhythm's security platform unifies SIEM, log management, network and endpoint monitoring, user behaviour analytics, security automation and advanced security analytics.

Mako Group

Mako Group

The Mako Group specializes in protection - providing security through auditing, testing, and assessments. And, we do it all with the highest quality standards possible.

Hewlett Packard Enterprise (HPE)

Hewlett Packard Enterprise (HPE)

HPE is an information technology company focused on Enterprise networking, Services and Support.

SCADAfence

SCADAfence

SCADAfence offers cutting edge cybersecurity solutions designed to ensure the operational continuity of industrial (ICS/SCADA) networks.

Invensis Learning

Invensis Learning

Invensis Learning is a professional training and certification company providing IT Service Management, IT Security & Governance, DevOps, Cloud Computing and Digital Awareness training.

Valire Software

Valire Software

Valire provide a solution for the automated detection of internal fraud.

National Initiative for Cybersecurity Education (NICE)

National Initiative for Cybersecurity Education (NICE)

NICE is a partnership between government, academia, and the private sector focused on cybersecurity education, training, and workforce development.

Keyless Technologies

Keyless Technologies

Simple, secure, and interoperable authentication. Keyless offers unmatched security, privacy and usability, while reducing risk and infrastructure costs.

BlueRiSC

BlueRiSC

BlueRiSC invent cutting-edge system assurance solutions for the 21st century with novel software and hardware designs focusing on security technologies that can be game changing.

HMS Networks

HMS Networks

HMS stands for Hardware meets Software. Our technology enables industrial hardware to communicate and share information with software and systems.

IDX

IDX

IDX is the leading consumer privacy platform built for agility in the digital age.

Naq Cyber

Naq Cyber

Naq is the number one platform for SMEs looking to become legally compliant and protect against cybercrime and other data-related incidents.

Easy Dynamics

Easy Dynamics

Easy Dynamics is a leading technology services provider with a core focus in Cybersecurity, Cloud Computing, and Information Sharing.

NSI Global

NSI Global

NSI Global is a specialist Global Risk and Intelligence Advisory Firm that has built a reputation for consistently managing complex projects.

Tracebit

Tracebit

Tracebit uses decoys to detect and respond to cloud intrusions in minutes.

Xiphera

Xiphera

Xiphera designs and implements proven cryptographic security for embedded systems.