• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • March 9th, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Security
Malware

New Malware Campaign Launched to Disrupt Winter Olympics 2018

January 8th, 2018 Uzair Amir Cyber Crime, Malware, Security 0 comments
New Malware Campaign Launched to Disrupt Winter Olympics 2018
Share on FacebookShare on Twitter

The 2018 Olympic Winter Games will be held in Pyeongchang in February 2018 but malware attacks against the event have already begun.

According to McAfee researchers, hackers are trying to target the upcoming Winter Olympics due to be held in Pyeongchang, South Korea. As per the findings from McAfee, cybercriminals are hunting for sensitive data from different groups that are all linked with the Olympics.

In its report, the company revealed that they identified infected emails being sent to organizations having some involvement with the games. Who is responsible for sending out these emails is yet to be identified. McAfee has warned about more attacks on organizations connected to the 2018 games.

More: Internet Minefield: Beware of fake WiFi spots in Rio stealing user data

The report stated that the malicious emails were primarily targeted towards ‘icehockey@pyeongchang2018.com’ whereas other organizations in South Korea on the BCC line were amongst the key targets including Ski suppliers and ice hockey teams. Most of the organizations were in some way linked to the upcoming games as some were connected through the provision of infrastructure while some were serving as support groups. The emails contained a malicious document that immediately created a hidden back channel in the computers when enabled.

New Malware Campaign Launched to Disrupt Winter Olympics 2018

According to a senior analyst at McAfee Ryan Sherstobitoff, the attackers seem to be ‘casting a wide net with this campaign’ because they have included generic email addresses like the ones that begin with info@.

He further noted that: “Theoretically, if they get into the network hosting the Pyeongchang email network for the Olympics, they have any number of possibilities moving inside. It depends on where the networks are connected — to specific teams, committees, planners at a high level.”

The campaign, stated McAfee, ran from 22nd Dec and bears all the signs of involvement of a nation-state adversary that also speaks the Korean language. Since the investigation is currently underway, therefore, the company did not provide any specific name of the probable perpetrator of the attacks.

This time around, attackers have used a much more sophisticated method than the regular spear phishing attack because the recipient of the email does not need to download any file to the malicious software gets installed without getting noticed by a security program. This fileless malware uses Microsoft Powershell to be launched, which has now become a very common tactic among cyber-attackers.

The IP address from which these malicious emails are being sent is based in Singapore and the email requests the recipient to open a Korean text file, which looks legitimate since it seems like an email from the National Counter-Terrorism Centre in South Korea. Through steganography, attackers have managed to hide the malware within images and text.

The timing of this campaign is rather crucial since North Korea has agreed to participate in high-level talks with South Korea. The first round of the détente will be starting soon and the focus of first meet-up would be on the potential participation of North Korea in 2018 Winter Olympics.

More: Fancy Bear Hackers Leak More WADA Data; Accuse More Athletes of Doping

  • Tags
  • Cyber Attack
  • Cyber Crime
  • gaming
  • internet
  • Malware
  • North Korea
  • Olympics
  • Privacy
  • security
  • South Korea
Facebook Twitter LinkedIn Pinterest
Previous article Hundreds of Android Gaming Apps are Tracking Your TV Viewing Habits
Next article New adware attack bombard phones & prevent users from disabling ads
Uzair Amir

Uzair Amir

I am an Electronic Engineer, an Android Game Developer and a Tech writer. I am into music, snooker and my life motto is 'Do my best, so that I can't blame myself for anything.'

Related Posts
European Banking Authority victim in Microsoft Exchange Server hack

European Banking Authority victim in Microsoft Exchange Server hack

FluBot Android malware mimics FedEx, Chrome apps to steal user data

FluBot Android malware mimics FedEx, Chrome apps to steal user data

John McAfee Charged with Fraud in Cryptocurrency Scam

John McAfee Charged with Fraud in Cryptocurrency Scam

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
European Banking Authority victim in Microsoft Exchange Server hack
Hacking News

European Banking Authority victim in Microsoft Exchange Server hack

FluBot Android malware mimics FedEx, Chrome apps to steal user data
Android

FluBot Android malware mimics FedEx, Chrome apps to steal user data

John McAfee Charged with Fraud in Cryptocurrency Scam
Cyber Crime

John McAfee Charged with Fraud in Cryptocurrency Scam

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us