Story image

Rumours fly about who was behind the PyeongChang Olympics hack

16 Feb 18

As speculation grows about who was behind the attacks on the PyeongChang Olympic Games opening ceremony, Talos Researchers identified a malware called “Olympic Destroyer” that may have been behind the attacks.

Recorded Future believes that the Olympic Destroyer malware should be treated as serious because of its destructive nature and ability to spread laterally.

It uses in-built Windows tools Psexec and WMI to infect systems and render data useless. It also use password stealing tool Mimikatz to extract credentials and continue moving across a target network.

The PyeongChang attack also included a set of Active Directory credentials and a software key, which suggests the malware had previously been used in an early reconnaissance phase.

In December, an attack on a telecommunications provider was the beginning stages of the attack on the Games.

“All samples of the Olympic Destroyer malware variant targeting the IT provider were timestamped five minutes prior to the compilation of the samples identified by Talos researchers as targeting the PyeongChang 2018 network. This suggests a parallel, two-pronged attempt to target the Olympics event, aimed at both organizers and infrastructure providers,” a report from US threat intelligence firm Recorded Future says.

The team also suggests that there are disparate code overlaps in the malware, suggesting a ‘false flag’ operation that is throwing researchers off the trail and diluting evidence.

Recorded Future has taken the analysis one step further, although there’s still no firm evidence as to who conducted the attack.

Recorded future director of strategic threat development Priscilla Moriuchi says that finding out who is behind the attacks is important because it shapes responses from government, victims and the public.

“Accurate attribution is both more crucial and more difficult to determine than ever because adversaries are constantly evolving new techniques and the expertise required to identify a sophisticated actor keeps increasing.”

The report suggests that the malware could originate from North Korea, China or Russia – but the case is not straightforward.

 “Complex malware operations make us take pause to reevaluate research methods and make sure the research community is not being misled by its own eagerness to attribute attacks,”explains Recorded Future principal security research of Inskit Group, Juan Andres Guerrero Saade.

Researchers from Intezer spotted code similarities between Olympic Destroyer and threat actors in China, including the APT3, APT10 and APT12 groups.

Recorded Future’s research group found code similarities linked with malware families belonging to the Lazarus Group in North Korea.

“The Olympic Destroyer campaign comes at a precarious time of geopolitical tensions with several possible perpetrators but conclusive proof in any one particular direction has not yet been shared,” Saade concludes.

Read further coverage of the PyeongChang Olympic hacks:

Winter Olympics hacked: Was it just disruptive or something more sinister?

Surprise - the PyeongChang Winter Olympic Games were hacked 

Disruption in the supply chain: Why IT resilience is a collective responsibility
"A truly resilient organisation will invest in building strong relationships while the sun shines so they can draw on goodwill when it rains."
Verifi takes spot in Deloitte Asia Pacific Fast 500
"An increasing amount of companies captured by New Zealand’s Anti-Money laundering legislation are realising that an electronic identity verification solution can streamline their customer onboarding."
Businesses too slow on attack detection – CrowdStrike
The 2018 CrowdStrike Services Cyber Intrusion Casebook reveals IR strategies, lessons learned, and trends derived from more than 200 cases.
What disaster recovery will look like in 2019
“With nearly half of all businesses experiencing an unrecoverable data event in the last three years, current backup solutions are no longer fit for purpose."
Proofpoint launches feature to identify most targeted users
“One of the largest security industry misconceptions is that most cyberattacks target top executives and management.”
McAfee named Leader in Magic Quadrant an eighth time
The company has been once again named as a Leader in the Gartner Magic Quadrant for Security Information and Event Management.
Symantec and Fortinet partner for integration
The partnership will deliver essential security controls across endpoint, network, and cloud environments.
Is Supermicro innocent? 3rd party test finds no malicious hardware
One of the larger scandals within IT circles took place this year with Bloomberg firing shots at Supermicro - now Supermicro is firing back.