Cybercrime The Olympic Destroyer - 2018

upnorth

Moderator
Thread author
Verified
Staff Member
Malware Hunter
Well-known
Jul 27, 2015
5,456



Olympic Destroyer tells the story of one of the most deceptive hacks in history – the 2018 Pyeongchang Olympic Games. But what makes this hacking attempt so slippery? And what makes the response so ‘extraordinarily brilliant?
Immense interesting investigation about the Olympic Destroyer. This serie in 3 parts is highly recommended to watch.

Reference :
 

upnorth

Moderator
Thread author
Verified
Staff Member
Malware Hunter
Well-known
Jul 27, 2015
5,456
There may be an event called 'invasion' in the Olympics. Suspicious communications to Japan were also on the rise until just before the postponement was decided.
I mentioned before in another thread by you @show-Zi , the beef Japan and South-Korea have with each other, so I can fully understand that type of suspicion. Especially when nobody really knew who it actually was.
 

upnorth

Moderator
Thread author
Verified
Staff Member
Malware Hunter
Well-known
Jul 27, 2015
5,456
Turla, APT28, and Sandworm are still active. The latter even tried to launch a supply chain attack like NotPetya again.

Of course, the law enforcement agencies of our country know that the listed hacker groups of the Russian special services have a spy network in the hacker environment of Ukraine. Most of these participants have been identified and are being monitored. Some of them agreed to cooperate with law enforcement agencies and special services of Ukraine. This is laborious and fruitful work with our international partners.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top