Categories: Security

Researchers Identify Malware That Disrupted Pyeongchang Olympics Launch

The malware used to disrupt the Pyeongchang Olympic Games’ opening ceremony on Friday was a purely destructive tool put into place by sophisticated adversaries, according to computer security firms who say they’ve identified the code involved.

Cisco’s Talos IT security division, CrowdStrike and FireEye all said they had identified malicious code they believe was that used in the attack, which initially affected internet protocol television displays, but spread to other systems.

Officials said they shut down the affected servers to avoid further damage, a move that rendered the games’ official website inaccessible, meaning spectators couldn’t use it to print out tickets or access information. The attack also disabled Wi-Fi networks used by reporters.

The affected systems were brought back online by Saturday morning, and on Sunday officials acknowledged the issues had been caused by a cyber-attack.

Malware analysis

Intel also called off a live drone show planned for the opening ceremonies – but that was because too many spectators were gathered in the area where it was supposed to take place, the local Pyeongchang organising committee said.

Cisco said on Monday it had recovered a sample of malware code, detected and uploaded by its security products, which it believes was that used in the attack.

The firm said it wasn’t aware of how the “Olympic Destroyer” malware initially reached the event’s servers. But they found it contained 44 usernames and passwords for accounts on pyeongchang2018.com, the the official Olympics domain name, which may have helped it access internal systems.

After penetrating a system, the malware searches a machine’s browser data and system memory for more credentials, and uses Windows features such as PSExec and Windows Query Language to spread across networks.

Cisco said the techniques used to move from one system to another are similar to those used by BadRabbit and NotPetya, destructive worms that initially targeted Ukrainian systems before causing damage worldwide.

Olympic Destroyer doesn’t appear to try to steal data, but only to render systems unusable and deleting information that could be used to recover them. The worm also deletes data that could be used to analyse the malware or trace its activities.

“The purpose of this malware is to perform destruction of the host, leave the computer system offline, and wipe remote data,” Cisco said in an advisory.

The company noted that the credentials found in the malware are one of several indications that the attack was carried out by sophisticated individuals who may have previously hacked the Olympics’ infrastructure.

Earlier attacks

Researchers had, in fact, previously found Pyeongchang Olympics organisations were targeted by information-stealing malware beginning in December.

Crowdstrike said it first detected Olympic Destroyer on Friday, 9 February, indicating its release was timed to coincide with the games’ opening ceremonies.

None of the security firms who tracked Olympic Destroyer said they had identified the source of the attack, and Olympics officials declined to comment on rumours in Pyeongchang that Russia-linked hackers carried it out because of a ban due to state-sponsored doping.

The Russia-linked hacker group Fancy Bear, also thought to have hacked the Democratic National Convention (DNC) during the US presidential election campaign in 2016, has been linked to a September 2016 Olympics breach that resulted in the public release of athletes’ medical records.

Do you know all about security? Try our quiz!

Matthew Broersma

Matt Broersma is a long standing tech freelance, who has worked for Ziff-Davis, ZDnet and other leading publications

Recent Posts

Russia Accused Of Cyberattack On Germany’s Ruling Party, Defence Firms

German foreign minister warns Russia will face consequences for “absolutely intolerable” cyberattack on ruling party,…

2 days ago

Alphabet Axes Hundreds Of Staff From ‘Core’ Organisation

Google is reportedly laying off at least 200 staff from its “Core” organisation, including key…

2 days ago

Apple Announces Record Share Buyback, Amid iPhone Sales Decline

Investor appeasement? Apple unveils huge $110 billion share buyback program, as sales of iPhone decline…

2 days ago

Tesla Backs Away From Gigacasting Manufacturing – Report

Tesla retreats from pioneering gigacasting manufacturing process, amid cost cutting and challenges at EV giant

3 days ago

US Urges No AI Control Of Nuclear Weapons

No skynet please. After the US, UK and France pledge human only control of nuclear…

3 days ago