Story image

Rumours fly about who was behind the PyeongChang Olympics hack

16 Feb 2018

As speculation grows about who was behind the attacks on the PyeongChang Olympic Games opening ceremony, Talos Researchers identified a malware called “Olympic Destroyer” that may have been behind the attacks.

Recorded Future believes that the Olympic Destroyer malware should be treated as serious because of its destructive nature and ability to spread laterally.

It uses in-built Windows tools Psexec and WMI to infect systems and render data useless. It also use password stealing tool Mimikatz to extract credentials and continue moving across a target network.

The PyeongChang attack also included a set of Active Directory credentials and a software key, which suggests the malware had previously been used in an early reconnaissance phase.

In December, an attack on a telecommunications provider was the beginning stages of the attack on the Games.

“All samples of the Olympic Destroyer malware variant targeting the IT provider were timestamped five minutes prior to the compilation of the samples identified by Talos researchers as targeting the PyeongChang 2018 network. This suggests a parallel, two-pronged attempt to target the Olympics event, aimed at both organizers and infrastructure providers,” a report from US threat intelligence firm Recorded Future says.

The team also suggests that there are disparate code overlaps in the malware, suggesting a ‘false flag’ operation that is throwing researchers off the trail and diluting evidence.

Recorded Future has taken the analysis one step further, although there’s still no firm evidence as to who conducted the attack.

Recorded future director of strategic threat development Priscilla Moriuchi says that finding out who is behind the attacks is important because it shapes responses from government, victims and the public.

“Accurate attribution is both more crucial and more difficult to determine than ever because adversaries are constantly evolving new techniques and the expertise required to identify a sophisticated actor keeps increasing.”

The report suggests that the malware could originate from North Korea, China or Russia – but the case is not straightforward.

 “Complex malware operations make us take pause to reevaluate research methods and make sure the research community is not being misled by its own eagerness to attribute attacks,”explains Recorded Future principal security research of Inskit Group, Juan Andres Guerrero Saade.

Researchers from Intezer spotted code similarities between Olympic Destroyer and threat actors in China, including the APT3, APT10 and APT12 groups.

Recorded Future’s research group found code similarities linked with malware families belonging to the Lazarus Group in North Korea.

“The Olympic Destroyer campaign comes at a precarious time of geopolitical tensions with several possible perpetrators but conclusive proof in any one particular direction has not yet been shared,” Saade concludes.

Read further coverage of the PyeongChang Olympic hacks:

Winter Olympics hacked: Was it just disruptive or something more sinister?

Surprise - the PyeongChang Winter Olympic Games were hacked 

SecOps: Clear opportunities for powerful collaboration
If there’s one thing security and IT ops professionals should do this year, the words ‘team up’ should be top priority.
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.