Explore the latest news and trends  

Sign up for our weekly security newsletter

Be the first to receive important updates on security


The Malware to Destroy the Olympic is actually False Flag Bomb


An analysis on Olympic Destroyer malware that is utilized in the PyeongChang Olympics assault uncovers, how deliberately advertisers implant the fake flags with regards to attribution, as per specialists.


Days after the devastating attack to the Winter Olympics Games' backend network, a group of security analysts ascribed the attacksto each and everybody from China, Russia, Iran and groups like the developing nation-state supported gang connected to North Korea.


The motive of the cyber-security industry is to find out the root of the malware nor the exact damage or the potential results due to the OlympicDestroyer's attack. Maybe no other revolutionary malware has such huge attribution assumption set ahead as the Olympic-Destroyer. Withinthe periods of its disclosure, analyst teams globally had figured out how to ascribe this malware to North Korea, China and Russia, in view of various highlights earlier attributed to digital-surveillance and disrupt actors of these nations or operates for these nations' legislature allegedly.


Kaspersky Lab specialists were also endeavoring to comprehend which hacking team was responsible for this malware. At the time amid their analysis, they came through something that resembled prove malware connecting to Lazarus - a monstrous country-state upheld group connected to North Korea as uploaded on businesswire.com dated 08/03/2018.


Kaspersky's chief of global analysis and investigation alerted the forum that attribution will become tricky in the following few years. Past the Lazurus fakeflag, analysts said Russian-speaking digital intelligence teamSofacy was likewise indistinctly involved in the whole attack. Different code of malware bits connected Chines-allied digital intelligence team APT12 (IXESHE), APT10 (MenuPass Group) and APT3 (Gothic Panda).


Nobody made an especially solid case for a particular actor from the private sector, yet there are several pieces of evidence point the finger to everybody from Russia reaching to China. The evidences are weak to support the fact that, attackers were Fancy Bear from Russia, a news release stated. However, Kaspersky alerts that a team utilizing novel procedures to frame a different nation could easily be confining Russia, as well. It would be ideal, said the organization, to allow this game out before concluding to anything.

» SPAMfighter News - 3/13/2018

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page