ABE chair meets Beheira, Daqahleya governors to advance agricultural development    CIB launches training programme, awareness campaigns for Global Fraud Awareness Week    Israel accused of ceasefire violations as humanitarian risks escalate in Gaza    Maternal, fetal health initiative screens over 3.6 million pregnant women    Banque Misr signs EGP 3bn revolving credit facility with SODIC    The Future Begins Now: A National Alliance Bridging the Gap Between Classroom Seats and Leadership Dreams    Ahl Masr Burn Hospital Concludes First Scientific Forum, Prepares for Expanded Second Edition in 2026    Egypt signs mining training agreement with Australia's Murdoch University    Australia returns 17 rare ancient Egyptian artefacts    Gold prices edge lower on Thursday    Gaza death toll rises as humanitarian crisis deepens, Israeli offensive expands in West Bank    Egypt expands rollout of Universal Health Insurance    Cairo affirms commitment to Lebanese sovereignty, urges halt to cross-border violations    China invites Egypt to join African duty-free export scheme    Egypt calls for stronger Africa-Europe partnership at Luanda summit    Egypt begins 2nd round of parliamentary elections with 34.6m eligible voters    Egypt warns of erratic Ethiopian dam operations after sharp swings in Blue Nile flows    Egypt scraps parliamentary election results in 19 districts over violations    Egypt extends Ramses II Tokyo Exhibition as it draws 350k visitors to date    Egypt signs host agreement for Barcelona Convention COP24 in December    Al-Sisi urges probe into election events, says vote could be cancelled if necessary    Filmmakers, experts to discuss teen mental health at Cairo festival panel    Cairo International Film Festival to premiere 'Malaga Alley,' honour Khaled El Nabawy    Cairo hosts African Union's 5th Awareness Week on Post-Conflict Reconstruction on 19 Nov.    Egypt golf team reclaims Arab standing with silver; Omar Hisham Talaat congratulates team    Egypt launches National Strategy for Rare Diseases at PHDC'25    Egypt adds trachoma elimination to health success track record: WHO    Grand Egyptian Museum welcomes over 12,000 visitors on seventh day    'Royalty on the Nile': Grand Ball of Monte-Carlo comes to Cairo    Egypt launches Red Sea Open to boost tourism, international profile    Omar Hisham Talaat: Media partnership with 'On Sports' key to promoting Egyptian golf tourism    Sisi expands national support fund to include diplomats who died on duty    Egypt's PM reviews efforts to remove Nile River encroachments    Egypt resolves dispute between top African sports bodies ahead of 2027 African Games    Germany among EU's priciest labour markets – official data    Paris Olympic gold '24 medals hit record value    It's a bit frustrating to draw at home: Real Madrid keeper after Villarreal game    Russia says it's in sync with US, China, Pakistan on Taliban    Shoukry reviews with Guterres Egypt's efforts to achieve SDGs, promote human rights    Sudan says countries must cooperate on vaccines    Johnson & Johnson: Second shot boosts antibodies and protection against COVID-19    Egypt to tax bloggers, YouTubers    Egypt's FM asserts importance of stability in Libya, holding elections as scheduled    We mustn't lose touch: Muller after Bayern win in Bundesliga    Egypt records 36 new deaths from Covid-19, highest since mid June    Egypt sells $3 bln US-dollar dominated eurobonds    Gamal Hanafy's ceramic exhibition at Gezira Arts Centre is a must go    Italian Institute Director Davide Scalmani presents activities of the Cairo Institute for ITALIANA.IT platform    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



Olympic Destroyer is back, targeting chemical, biological threat protection entities
Published in Amwal Al Ghad on 21 - 06 - 2018

Kaspersky Lab researchers tracking the Olympic Destroyer threat that famously struck the opening of the Winter Olympic Gamesin Pyeongchang with a destructive network worm have discovered that the hacking group behind it is still active.
It appears to be targeting Germany, France, Switzerland, the Netherlands, Ukraine and Russia, with a focus on organizations involved in protection against chemical and biological threats.
Olympic Destroyer is an advanced threat that hit organizers, suppliers and partners of the Winter Olympic Games 2018 in Pyeongchang, South Korea with a cybersabotage operation based on a destructive network worm.Many indicators pointed in different directions for the origins of the attack, causing some confusion in the info-security industry in February 2018.
A few rare and sophisticated signs discovered by Kaspersky Lab suggested that Lazarus group, a North Korea-linked threat actor, was behind the operation. However, in March, the company confirmedthat the campaign featured an elaborate and convincing false flag operation, and Lazarus was unlikely to be the source. Researchers have now found the Olympic Destroyer operation is back in action, using some of its original infiltration and reconnaissance toolset, and focusing on targets in Europe.
The threat actor is spreading its malware through spear-phishing documents that closely resemble the weaponized documents used in preparation for the Winter Olympics operation. One such decoy document referred to the ‘Spiez Convergence', a bio-chemical threats conference held in Switzerlandand organized by the Spiez Laboratory, an organization that played a keyrole inthe Salisbury attack investigation. Another document was targeting an entity of the health and veterinary control authority of Ukraine. Some of the spear-phishing documents uncovered by researchers carry words in Russian and German.
All final payloads extracted from the malicious documents were designed to provide generic access to the compromised computers. An open-source and free framework, widely known as Powershell Empire, was used for the second stage of the attack.
Based on Kaspersky Lab telemetry and files uploaded to multi-scanner services, the interests of thisOlympic Destroyer campaign appear to have been entitiesinGermany, France, Switzerland, the Netherlands, Ukraine and Russia.

"The appearance, at the start of this year, of Olympic Destroyer with its sophisticated deception efforts, changed the attribution game forever and showed how easy it is to make a mistake with only fragments of the picture that are visible to researchers. The analysis and deterrence of these threats should be based on cooperation between the private sector and governments across national borders. We hope that by sharing our findings publicly, incident responders and security researchers will be better placed to recognize and mitigate such an attack at any stage in the future." said VitalyKamluk, security researcher in Kaspersky Lab's GReAT team.
In the previous attack, during the Winter Olympic Games, the beginning of the reconnaissance stage was a couple of months before the epidemic of the self-modifying destructive network worm. It is highly possible that Olympic Destroyer is preparing a similar attack with new motives. That is why we advise biological and chemical threat research entities to stay on high alert and launch an out-of-schedule security audit where possible.
Kaspersky Lab products successfully detect and block Olympic Destroyer-related malware.


Clic here to read the story from its source.