Wednesday, May 14, 2025
HomeSecurity NewsWinter Olympics Website Hacked & Downed About 12 Hours by Cyber Attack

Winter Olympics Website Hacked & Downed About 12 Hours by Cyber Attack

Published on

SIEM as a Service

Follow Us on Google News

Pyeongchang 2018 Winter Olympics Website Hacked and the site was downed about 12 hours during the opening ceremony.

Paralympic Games confirming that they experienced a cyber attack that caused a malfunction of the internet protocol televisions (IPTVs) at the Main Press Centre.

Due to attack, Website cause customers who bought tickets were unable to print their reservations.There were also problems with wi-fi and televisions in the media centre.

- Advertisement - Google News

Paralympic Games officials confirm that its servers had been hit during the even and Russian hackers may have been striking as revenge for bans.

Also Read: California Voter Database Leaked – 19 Million Voters Records Under Risk

Paralympic Games forced to shut down the system around 7.15 pm to stop the further attack and it took more than 12 hours to revert the normal state.

An Olympics spokesman admitted: “There were some issues that impacted some of our non-critical systems last night for a few hours.“We apologise for the inconvenience caused to all those affected.”

Also, officials said “All competitions are running as planned and the systems are working at the expected level. Our technology partners and our experienced team of ICT experts are working to maintain the systems”

A spokesman for the Russian ministry denied the country had anything to do with any attacks.

Notice by Paralympic Games for system outage 

Since the Attack motivation and source is unknown, McAfee senior analyst Ryan Sherstobitoff said, his teams found a new variant of the malicious documents targeting the Winter Games a few days prior to the opening ceremony.

“It is clear attacks are ongoing and are likely to continue throughout the duration of the games. What is yet to be determined is if actors are working simply to gain disruption, or if their motives are greater.”

Also, Security experts have warned that major international events such as the Olympics are major targets for hackers.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Weaponized PyPI Package Targets Developers to Steal Source Code

Security researchers at RL have discovered a malicious Python package called "solana-token" on PyPI...

Microsoft Alerts on AD CS Flaw Enabling Remote Denial-of-Service Attacks

Microsoft has issued a security advisory for a newly identified vulnerability in Active Directory...

Chinese Hackers Exploit SAP NetWeaver Zero-Day Vulnerability to Target Critical Infrastructure

EclecticIQ analysts have uncovered a sophisticated cyber-espionage campaign orchestrated by China-nexus nation-state Advanced Persistent...

Researchers Unveil New Threat-Hunting Techniques to Detect Azure Managed Identity Abuse

A group of cybersecurity specialists from Hunters, working under the prestigious Team Axon, have...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Phishing Campaign Uses Blob URLs to Bypass Email Security and Avoid Detection

Cybersecurity researchers at Cofense Intelligence have identified a sophisticated phishing tactic leveraging Blob URIs...

UK Government to Shift Away from Passwords in New Security Move

UK government has unveiled plans to implement passkey technology across its digital services later...

New Spam Campaign Leverages Remote Monitoring Tools to Exploit Organizations

A sophisticated spam campaign targeting Portuguese-speaking users in Brazil has been uncovered by Cisco...