Monday, April 28, 2025
HomeSecurity NewsPhishing Campaign Targeting Companies Associated with Pyeongchang Olympics

Phishing Campaign Targeting Companies Associated with Pyeongchang Olympics

Published on

SIEM as a Service

Follow Us on Google News

Security researchers from McAfee spotted a Phishing campaign targeting companies associated with Pyeongchang Olympic 2018.The multi-sport event is to take place in South Korea.

Hackers primarily targetted icehockey@pyeongchang2018.com and several other Korean companies in BCC.And most of them associated in some way to Pyeongchang Olympic.

McAfee Researchers spotted the campaign started on December 22, 2017, and the activity appeared up to December 28, 2017.All the Email sent from IP address 43.249.39.152 in Singapore and the attackers spoofed the Email address to have appeared as info@nctc.go.kr.

Attached is an email was a malicious Microsoft Word document with the original file name 농식품부, 평창 동계올림픽 대비 축산악취 방지대책 관련기관 회의 개최.doc (“Organized by Ministry of Agriculture and Forestry and Pyeongchang Winter Olympics”).
- Advertisement - Google News

Attackers embedded malicious documents as a hypertext application (HTA) file and then hide it as an image in the remote server with visual basic macros to launch the decoder script.Researchers said they also wrote custom PowerShell code to decode the hidden image and reveal the implant.

Also Read Real-Time Intelligence Feed to Catch Malicious Phishing Domains SSL Certificate

When the victim opens the document it asks to “enable content” to load the file properly in word, if victim clicks on “enable content” then the malicious document executes PowerShell script which downloads and reads an image file from a remote location and carves out a hidden PowerShell implant script embedded within the image file to execute.

The script is heavily disguised with string-based obfuscation to make the analysis job difficult researchers deobfuscate the control server URLs, the implant establishes a connection to the following site over SSL.

hxxps://www[dot]thlsystems[dot]forfirst[dot]cz:443/components/com_tags/views/login/process[dot]php

Researchers said, based on our analysis, this implant establishes an encrypted channel to the attacker’s server, likely giving the attacker the ability to execute commands on the victim’s machine and to install additional malware.

With the upcoming Olympics, we expect to see an increase in cyber attacks using Olympics-related themes,” the McAfee report concluded.

IoC of attacks – Pyeongchang Olympic

SHA-1

c388b693d10e2b84af52ab2c29eb9328e47c3c16
8ad0a56e3db1e2cd730031bdcae2dbba3f7aba9c

IPs

200.122.181.63

Domains

thlsystems.forfirst.cz
mafra.go.kr.jeojang.ga
Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Cybercriminals Selling Sophisticated HiddenMiner Malware on Dark Web Forums

Cybercriminals have begun openly marketing a powerful new variant of the HiddenMiner malware on...

Three IXON VPN Client Vulnerabilities Let Attackers Escalate Privileges

Security researchers at Shelltrail have discovered three significant vulnerabilities in the IXON VPN client...

Cybersecurity Firm CEO Arrested for Planting Malware in Hospital Systems

Jeffrey Bowie, the CEO of a local cybersecurity firm, has been arrested for allegedly...

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

FBI Alerts Public to Scammers Posing as IC3 Officials in Fraud Scheme

The Federal Bureau of Investigation (FBI) has issued a warning regarding an emerging scam...

New ‘Waiting Thread Hijacking’ Malware Technique Evades Modern Security Measures

Security researchers have unveiled a new malware process injection technique dubbed "Waiting Thread Hijacking"...

EU’s GDPR Article 7 Poses New Challenges for Businesses To Secure AI-Generated Image Data

As businesses worldwide embrace digital transformation, the European Union’s General Data Protection Regulation (GDPR),...