Sunday, April 27, 2025
HomeSecurity NewsWinter Olympics Website Hacked & Downed About 12 Hours by Cyber Attack

Winter Olympics Website Hacked & Downed About 12 Hours by Cyber Attack

Published on

SIEM as a Service

Follow Us on Google News

Pyeongchang 2018 Winter Olympics Website Hacked and the site was downed about 12 hours during the opening ceremony.

Paralympic Games confirming that they experienced a cyber attack that caused a malfunction of the internet protocol televisions (IPTVs) at the Main Press Centre.

Due to attack, Website cause customers who bought tickets were unable to print their reservations.There were also problems with wi-fi and televisions in the media centre.

- Advertisement - Google News

Paralympic Games officials confirm that its servers had been hit during the even and Russian hackers may have been striking as revenge for bans.

Also Read: California Voter Database Leaked – 19 Million Voters Records Under Risk

Paralympic Games forced to shut down the system around 7.15 pm to stop the further attack and it took more than 12 hours to revert the normal state.

An Olympics spokesman admitted: “There were some issues that impacted some of our non-critical systems last night for a few hours.“We apologise for the inconvenience caused to all those affected.”

Also, officials said “All competitions are running as planned and the systems are working at the expected level. Our technology partners and our experienced team of ICT experts are working to maintain the systems”

A spokesman for the Russian ministry denied the country had anything to do with any attacks.

Notice by Paralympic Games for system outage 

Since the Attack motivation and source is unknown, McAfee senior analyst Ryan Sherstobitoff said, his teams found a new variant of the malicious documents targeting the Winter Games a few days prior to the opening ceremony.

“It is clear attacks are ongoing and are likely to continue throughout the duration of the games. What is yet to be determined is if actors are working simply to gain disruption, or if their motives are greater.”

Also, Security experts have warned that major international events such as the Olympics are major targets for hackers.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...

New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales

AI-generated medical scams across TikTok and Instagram, where deepfake avatars pose as healthcare professionals...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

FBI Alerts Public to Scammers Posing as IC3 Officials in Fraud Scheme

The Federal Bureau of Investigation (FBI) has issued a warning regarding an emerging scam...

New ‘Waiting Thread Hijacking’ Malware Technique Evades Modern Security Measures

Security researchers have unveiled a new malware process injection technique dubbed "Waiting Thread Hijacking"...

EU’s GDPR Article 7 Poses New Challenges for Businesses To Secure AI-Generated Image Data

As businesses worldwide embrace digital transformation, the European Union’s General Data Protection Regulation (GDPR),...