Hacking The 2018 Winter Olympics
The Olympic Destroyer Hacks The Winter Olympics 2018 Swiping Files (Not Medals)
In total, 91 national teams participated in the Winter Olympics 2018. The Olympians were not the only stars, major companies such as Samsung and Intel showed off with self-driving cars, virtual-reality viewing stations and super-fast video streaming. This made the Winter Olympics 2018 event the most high-tech Olympic Games in history. To illustrate, Intel launched 1,200 “shooting star” drones to create aerial images of the Olympic rings. Alibaba provided the cloud service and eCommerce for the Olympics with several hundred employees that it sent to South Korea to handle the operations. Atos, a Paris-based information technology company, handled the IT side of the event. It moved all of the critical IT systems to the cloud — a first for the Olympics. All these efforts are also a dry run for the Winter Olympics in 2022 that will be hosted in China. However, going high-tech has a downside – it’s the perfect bait for hackers. It already started at the opening ceremony, when hackers caused both LAN and Wi-Fi communications to fail during the opening ceremony on February 9, 2018, prevented tickets from being printed from the Olympics website. The hackers knew usernames, server names and passwords used for the Olympic Games infrastructure. Dubbed the “Olympic Destroyer”, the malware works as follows:- It is deployed via the EternalRomance exploit which was leaked by Shadow Brokers in 2017. This exploit was also used in the NotPetya and Bad Rabbit ransomware strains.
- Once the malware is on the targeted machine, it checks the network for two ways to propagate by checking the Address Resolution Protocol (ARP) table and by using WMI to get a list of all systems.
- Once it knows the best way to propagate, it steals credentials to distribute copies of itself to remote systems (using a legitimate, signed copy of PsExec and WMI).
- It then disables tools used for recovering individual files, folders, and entire drives. It also prevents the Windows recovery console to repair anything on the system, and deletes the System and Security Windows event log to avoid analysis.
- The malware starts swiping files on the machine as well as on shared network drives.
Featured Resources
Subscribe to Our Blog
Subscribe now to get the latest insights, expert tips and updates on threat exposure validation.
Subscribe