Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

Olympic Destroyer Creator Deceptively Linked the Worm with Hackers from North Korea

 

A computer worm called Olympic Destroyer was targeted at the Pyeongchang Olympics of 2018, while its creator falsely attributed it to hackers of North Korea. On 9th February, the hacking attack by Olympic Destroyer disabled the WiFi connection when the Pyeongchang Olympic ceremony was going on in the stadium while it further affected the event's many broadcasts via television screens which were knocked out.

 

Moreover, the hack impacted the websites of Pyeongchang 2018 that prevented game admirers from printing tickets else seeing events' results. According to Kaspersky, the Olympic Destroyer worm had been executed for infecting computers of the Pyeongchang 2018 network.

 

Cyber-security Company Kaspersky Lab, headquartered in Moscow, discovered through their research that Olympic Destroyer's creator had placed one fake flag within the worm to make the hack look from North Korean cyber attackers.

 

Olympic Destroyer didn't just hack into the 2018 international game's IT system; however, it as well disrupted the working of a number of ski resorts' ski lifts and ski gates inside South Korea. Researchers at Kaspersky Lab said based on complete evidence that the conclusions point finger at Lazarus- a notorious group receiving state backing. Forbesmiddleeast.com posted this, March 11, 2018.

 

With successful attack, the worm subsequently managed grabbing passwords from contaminated PCs so it closed the systems. Kaspersky on verifying the evidences even more reached the conclusion that whatever features were there of the worm they did not correspond with the code; however, had been very cautiously framed for accurately matching Lazarus' fingerprints that made the worm's features one refined false flag. Moreover, software that the hackers employed during the February Olympic function actually was a copy of Lazarus' malware utilized for deflecting the doubt from the actual hackers.

 

The security company even claims the hack has another level of fraud because certain clues, including NordVPN along with host facilitator MonoVM utilities indicate Fancy Bear the Russian hacker syndicate's involvement. Incidentally, Fancy Bear is currently known for infiltrating the World Anti-Doping Agency's database a number of times.

 

Kaspersky concludes, considering the several probable sources responsible for the hack, it's not possible to know exactly the entity that executed it.

» SPAMfighter News - 3/14/2018

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next