A cyber attack brought internet networks to a standstill during the opening ceremony of the Winter Olympics. The system's failure looked to be a total embarrassment to the organizers.
A cyber attack brought internet networks to a standstill during the opening ceremony of the Winter Olympics. The system’s failure looked to be a total embarrassment to the organizers.
The cyber attack caused WIFI and LAN communications breakdown when the ceremony kicked off on 9th February and this prevented tickets printing from Olympics website, as reported by the spokeswoman of the Pyeongchang games, Yu Chae-Yeon. After the hacking, the system was repaired approximately 8 AM the next day, the organizers of the event are now carrying out an investigation on whom is behind those attack.
This incident highlights the threats of hacking considering the fact that South Korea had already arranged a team of security professionals prior to kick off. The impromptu nature of the cyber operations in the Olympics makes the event to be more prone to hacking, said prof Jun Hwang – won the professor of the cybersecurity in Korea’s Hosea College.
“Anything which is run on temporal bases carries the risks because it is not everyone who is working for a hand in the glove, “Said Hwang. This gives a bad impression on the reputation of Pyeongchang competitions considering how essential network connection plays a major role in such an event.
Hwang could not point out suspect before scrutinizing the code first but he was unable to revoke the participation of players from Russia and North Korea. Even if this year Winter Olympics attracted a high stage of an appointment from North Korea, it has always been condemned in the past attacks of South Korea, it has that tendency of making such provocations when administering an olive branch. Russia was outlawed because of the doping scandals whereby some of the athletes from Russia were playing as individuals.
The hackers had knowledge on the server names, usernames and the passwords used during the Olympic sports Infrastructures, Ciscos Talos threat division made writings on the blog, saying that forty-four individual accounts were able to be captured inside the code.
Representations taken by the Olympic Destroyer reveals that the hackers were not able to steal any information, rather the analysis reveals that the hackers only carried out destructive functions.
The samples which were possible to be identified showed that the hackers were not looking for the information about the Olympic Games rather they intended to interrupt the games, highlighted the blog, therefore this can be concluded that the hackers aimed to bring embarrassment in the opening commemoration of the Olympic game.