Connect with us


A favorite target of Russian hackers, the Olympics are on guard

In 2016, they leaked private medical records of American stars like Simone Biles and Serena Williams. In 2018, they shut off online ticketing during the Olympics’ opening ceremony in South Korea. And in 2021, governments and cybersecurity experts around the world are on edge that they might be back again for the Tokyo Olympics.

It sounds strange, but it’s true: Russian hackers have disrupted each of the Olympic Games since 2016, when Russia was suspended from full participation.

And it brings the question of whether Russia will try to disrupt the 2021 Games as well. No organization has yet offered definitive public evidence that it’s trying, but experts are still on edge.

In a public alert released Monday, the FBI warned that hackers could try a number of potential attacks to disrupt the Tokyo Games. 

“The FBI to date is not aware of any specific cyber threat against these Olympics, but encourages partners to remain vigilant,” it said.

The previous attacks are what government officials and cybersecurity experts have said are an apparent retaliation for the International Olympic Committee and the World Anti-Doping Agency repeatedly declaring that Russia used an elaborate doping scheme to give its athletes an edge in the 2014 Olympic Games in Sochi, the first and so far only time Russia hosted the Games after the fall of the Soviet Union.

That scheme, as well as Russian officials’ attempts to block investigators from looking into it, led to Olympic officials banning the country from fully participating in all Olympics between the 2016 Games in Rio and 2022 Winter Olympics in Beijing.

But while Russia wasn’t able to compete in 2016 and 2018, the Kremlin has made its presence known through hackers working for its military intelligence agency, the GRU.

Ciaran Martin, the former head of the United Kingdom’s public cybersecurity agency, the National Cyber Security Centre, said the attacks on the Olympics reflected Russia’s willingness to send its hackers against targets that might seem off-limits for Western governments.

“When I started, we were always talking about Russia and sort of hard infrastructure, like energy,” Martin said. “Of course, some of their most brazen and impactful interventions have come after softer infrastructure: politics, sports, undermining confidence and enjoyment in some of the things that are the fabric of the West, the nonauthoritarian world. Sport fits into that.”

Russia has repeatedly denied responsibility for the hacks. But several governments, including the U.S., U.K. and the Netherlands, as well as a number of cybersecurity experts around the world, have attributed both the 2016 and 2018 campaigns to the GRU. 

The NCSC, Martin’s former agency, announced in October that the GRU had been laying groundwork to hack the Summer Olympics in Tokyo last year as well, before those were delayed over the coronavirus pandemic. The NCSC declined a request for an update on if it had seen Russia targeting the Games this month.

There’s little doubt who was responsible for the previous hacks, however. The U.S. has published extensive technical details in the form of indictments that tie them to specific GRU officers.

In 2016, the same year that the GRU hacked and released Democratic Party files to hinder presidential candidate Hillary Clinton’s campaign against Donald Trump, it also went after the World Anti-Doping Agency, the IOC-funded foundation devoted to keeping athletes from using prohibited drugs in international competition.

Almost immediately after the agency published a major report accusing Russia of doping, GRU officers went to work trying to hack a number of Olympics-related targets, successfully breaching some accounts belonging to the agency and its American affiliate, the U.S. Anti-Doping Agency, and gaining access to some athletes’ medical information.

One of the victims was Simone Biles, whose attention deficit hyperactivity disorder medication was leaked on a website set up by the hackers, leading her to write a clarification that she only used approved drugs.

“I have ADHD and I have taken medicine for it since I was a kid,” she tweeted. “Please know, I believe in clean sport, have always followed the rules, and will continue to do so as fair play is critical to sport and is very important to me.”

Another was Serena Williams, whose files indicated she had received a waiver to use an anti-inflammatory muscle medication.

The attack on the 2018 Games was different, but just as chaotic. Ahead of the Winter Games in Pyeongchang, South Korea, GRU officers cast a wide net, creating fake versions of popular Korean apps in hopes of tricking people into downloading them. They tried signed up for a mass email service to pump out phishing emails to athletes. They sent fake government warnings of earthquakes to companies that were involved in running the Games.

All of that was to help the agency spread a masterwork of malicious software that the GRU had written. Built with a number of tricks and turns to confuse researchers, it expertly replicated itself onto other computers once installed and could render victim computers inoperable.

On Feb. 9, during the Games’ Opening Ceremony, the hackers set it off. Thousands of computers used by an IT company serving the Games became suddenly unusable. Attendees couldn’t show tickets from the IOC app. The Wi-Fi at the stadium hosting the ceremony went out, and all the stadium’s internet-connected TV sets went black.

The Pyeongchang cybersecurity team only avoided a bigger catastrophe because they took emergency measures to quickly remedy the situation, moving some Olympic check-in services offline and spending the entire night hastily rebuilding their broken network.

The GRU’s malicious program, seemingly written from scratch to make it more difficult to trace, “was absolutely an attempt to screw things up,” said Craig Williams, the director of outreach at the cybersecurity company Talos, which was the first to identify the program.

“The actor behind this piece of malware went to great lengths to do it quickly and quietly,” Williams said.

Now experts have turned their attention to the Games in Tokyo, watching to see if Russia or other hackers will try to exploit them.

“I think there’s an even chance,” said John Hultquist, the director of threat intelligence at the cybersecurity company Mandiant.

“They’ve done it in the past,” he said. “Circumstances are all the same as far as Russian athletes not being allowed to compete, and we know they were prepping for it. Is it possible they’ve changed? Absolutely.”

In an emailed statement, an Olympics spokesperson said that “the IOC has helped Tokyo 2020 to take a range of measures and is making thorough preparations.” The spokesperson declined to get into specifics, saying “maintaining secure operations is the main focus, and in line with best practices for cyber security.”

It’s possible that the Tokyo Games are already disrupted enough by the coronavirus that Russia won’t be interested. Many in Japan are opposed to hosting the Games during a pandemic; spectators are banned for fear of spreading the disease. Russia may leave it alone this year, Hultquist said. 

“We have to recognize Covid is a big disruptor,” he said. The GRU “could have changed the target,” he said. “Just not interested anymore.”

The Cyber Threat Alliance, a cybersecurity trade group that pools threat intelligence from its companies around the world, wrote in an assessment for the Tokyo Games that Russia’s prior actions had opened the door for state-sponsored hackers to conduct operations with little fear of consequence.

“Russian, North Korean, and Chinese state-sponsored adversaries likely pose the most significant threats to the Games,” the CTA found. “While nation-state actors have the potential to carry out a variety of different types of operations, we judge that disruptive attacks and disinformation campaigns are the most likely.”

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published.


Pop mogul Simon Cowell was a racing flop with ‘awful’ £35,000 horse he owned with Ant and Dec – that didn’t win a penny

SIMON COWELL conquered the music world – but his foray into racing ended in disaster with an ‘awful’ £35,000 horse he owned with Ant and Dec.

The music mogul, 62, has done it all with bands like One Direction, Little Mix and solo acts Olly Murs and James Arthur, to name but a few.

Cowell owned an 'awful' £35,000 horse with Ant and Dec - but the runner didn't win a single penny in six races


Cowell owned an ‘awful’ £35,000 horse with Ant and Dec – but the runner didn’t win a single penny in six racesCredit: PA:Press Association
Cowell remains a massive racing fan and loves Royal Ascot and the Epsom Derby


Cowell remains a massive racing fan and loves Royal Ascot and the Epsom Derby

His Syco label – plus shows such as Britain’s Got Talent – have dominated the entertainment industry and brought him an estimated net worth of £385m.

A lover of Royal Ascot and the Epsom Derby, he looked perfectly poised to strike a knockout blow in the world of thoroughbreds.

But it turns out his runner was far from No1 in the charts – and never even finished better than fifth during a doomed six-race career.

Things looked promising at the start.

Named It’s A Yes From Me, the runner was trained with the respected James Fanshawe and sent off at 8-1 for his first race in June 2014.

But coming last of five by 13-and-a-half lengths was unfortunately about as good as it got for the gelding.

A month’s rest followed before he was sent off at 40-1 in a six-furlong sprint at Doncaster.

But there he could only manage fifth again, and it was same at Redcar the next month.

‘Dreadfully slow’

By October that year – with further finishes of sixth and tenth – It’s A Yes From Me came second-last in a one-mile race at Kempton.

One analysis of the race warned punters the horse was ‘one to tread carefully’ with.

Well, Cowell and Ant and Dec took that advice to heart as they never raced him again.

The horse was penniless from six races, never finishing high enough to recoup some of that £35,000 investment.

It’s doubtful Cowell, with hundreds of millions in the bank, lost any sleep over that.

But Ant and Dec revealed just how bad things has got with the horse during an interview last year.

Dec said of It’s A Yes From Me: “It was awful, it was a dreadfully slow horse.

“It wasn’t a racehorse it was just a horse, because it didn’t race.

“Every time we got to the BGT studio Simon would say, ‘I keep paying stable fees on this horse, but I’ve never seen it run’.”

Cowell originally wanted to name the nag after himself, but they settled on It’s A Yes From Me when they bought it in 2013.

‘It was awful’

Dec revealed its eventual fate: “I think it got rehomed.”

Of course it’s not all been bad for Cowell at the races.

He was one of the exclusive few at the Epsom Derby in June, having a great time with partner Lauren Silverman and Piers Morgan.

And two weeks later he was at Royal Ascot – where he first discovered his love of racing.

Cowell told SunSport’s Matt Chapman during a chat at Epsom: “I’ve got my son Eric with me today.

“My mum and dad years ago used to take me to Ascot and I was probably about his age – seven or eight.

Cowell with partner Lauren at Epsom earlier this year


Cowell with partner Lauren at Epsom earlier this yearCredit: Getty
It's A Yes From Me trails behind in last during one of his six races


It’s A Yes From Me trails behind in last during one of his six races
The music supremo tweeted about his horse's bad start... which never got much better


The music supremo tweeted about his horse’s bad start… which never got much better

Most read in Horse Racing

“So the fact I can now bring him to the races as well is brilliant. It brings back a lot of good memories.

“Making TV shows is my passion. But racing is actually my second passion.”

He hasn’t made that passion the money-maker his music label is, but don’t rule out Cowell staging his own comeback at the track in the near future.


Commercial content notice: Taking one of the bookmaker offers featured in this article may result in a payment to The Sun. 18+. T&Cs apply.

Remember to gamble responsibly

A responsible gambler is someone who:

  • Establishes time and monetary limits before playing
  • Only gambles with money they can afford to lose
  • Never chases their losses
  • Doesn’t gamble if they’re upset, angry or depressed
  • Gamcare –
  • Gamble Aware –

Commercial content notice: Taking one of the bookmaker offers featured in this article may result in a payment to The Sun. 18+. T&Cs apply.

Remember to gamble responsibly

A responsible gambler is someone who:

  • Establishes time and monetary limits before playing
  • Only gambles with money they can afford to lose
  • Never chases their losses
  • Doesn’t gamble if they’re upset, angry or depressed
  • Gamcare –
  • Gamble Aware –
Continue Reading


Minnesota wildfire doubles in size, creates its own weather

A wildfire in northeastern Minnesota more than doubled in size Tuesday, growing to more than 19,000 acres, after it produced pyrocumulous clouds that generated lightning and even raindrops, fire officials said.

The Greenwood Fire’s growth, most of which happened Monday afternoon, prompted firefighters to leave McDougal Lake, about 80 miles south-southwest of Duluth, officials said. Authorities fear that structures might have been destroyed or damaged.

“We had crews embedded, and as this fire took off, it was quite an effort to communicate with forces on the ground so they could get out,” said federal fire incident spokesman Clark McCreedy.

The pullout was a success, and no injuries were reported. However, downed trees and necessary cleanup mean crews have been unable to assess damage around the lake, McCreedy said.

In addition to the firefighter pullout, 159 dwellings were evacuated Monday, according to an update from the National Wildfire Coordinating Group. Cabins, homes and recreational sites remain under threat, the group said.

Patrick Prochaska, a Minneapolis resident who built a cabin near McDougal Lake in 2012, told NBC affiliate KARE that he watched via security camera as flames mostly bypassed his property Monday, causing minor damage.

“I was feeling very scared,” he said. “At the same time, I could see that it was not doing anything to the house, and it was kind of reassuring.”

The fire in and north of Superior National Forest has mostly performed according to the weather, fire officials said. On Monday, with dry fuel on the ground and temperatures in the high 80s, it was an expanding inferno punctuated by strobes of lightning.

“The winds were drawn into the fire from all directions,” the incident’s fire behavior analyst, Michael Locke, said in a video update Tuesday. “It created what we call pyrocumulous clouds. And really high in the atmosphere … you’d see a thunderstorm, and in fact they went high enough to produce a few sprinkles of rain and even some lightning.”

Temperatures dipped into the mid-70s Tuesday, and the blaze mellowed. “The real story was cloud cover and cooler temperatures,” McCreedy said.

More of the same, and possibly rain, was in the forecast, giving officials hope that they might be able to close the book on an unusually active and dry fire season in Minnesota.

Experts have said climate change has set the stage for extreme weather, including an increase in the frequency and intensity of wildfires in the Northern Hemisphere.

Firefighters — 426 were assigned to the Greenwood event — have been confronted with “prolonged, severe drought,” making parts of Minnesota look like the fire-prone West this summer, McCreedy said.

The Greenwood Fire, which was detected Aug. 15, is believed to have been sparked by lightning.

So far, firefighters have scored no containment, and areas including McDougal Lake, Sand Lake and the Highway 2 corridor have been under mandatory evacuation orders. The federal Boundary Waters Canoe Area Wilderness was closed Saturday “due to active and increasing fire activity, extreme drought, limited resources,” the National Forest Service said in a notice.

Officials set a goal of Sept. 1 for full containment.

“We’re probably going to get more of that moderating weather for the rest of the week,” McCreedy said. “That opens the door for fire crews to make progress on the ground.”

Continue Reading


Hiker survives grizzly bear attack at Denali National Park

A tourist from Indiana was attacked and injured by a grizzly bear at Denali National Park and Preserve in Alaska on Monday night, park officials said.

The 55-year-old tourist, whose name was not released, was hiking alone in dense fog in the Thoroughfare Pass area when a mother bear and multiple cubs charged him from nearby bushes, the National Park Service said in a statement Tuesday.

He had puncture wounds to a calf, his left ribs and his left shoulder, the agency said.

The victim used bear spray that might have cut the attack short, the park service indicated. He walked 1.5 miles to a visitor’s center where “medical personnel” vacationing at Denali treated him as a park bus driver called 911, it said.

The hiker was taken to a medical center near the park before he was transferred to Fairbanks Memorial Hospital, about 120 miles away, park officials said. He was stabilized at the Fairbanks hospital, they said.

“Due to the apparent defensive nature of this attack, there are no plans to locate the bear involved,” the park service said. “Female bears with cubs are naturally defensive of their young, especially when surprised. There is no indication that this bear is unusually dangerous.”

Grizzly bears are federally protected as a threatened species in the lower 48 states. According to the National Wildlife Federation, fewer than 1,500 grizzlies are left in the lower 48, but they thrive, comparatively, in Alaska, where they have a population of about 31,000.

The backcountry area of the attack is closed for one week as a precaution, the park service said.

Continue Reading


Copyright © 2021 Insight Global.