Anatomy of a Breach

Anatomy of a Breach: Olympic Destroyer — Russia Attacks the Winter Olympics and Blames Everyone Else

> series: anatomy_of_a_breach —— part: 110 —— target: pyeongchang_winter_olympics —— attacker: russian_gru —— disguise: false_flags<span class="cursor-blink">_</span>_

Hedgehog Security 28 February 2018 12 min read

The opening ceremony. The website down. The Wi-Fi dead. And the malware was designed to frame someone else.

During the opening ceremony of the 2018 Pyeongchang Winter Olympics on 9 February, the Games' IT infrastructure suffered a coordinated cyber attack. The official Olympics website went down — preventing spectators from printing tickets. The Wi-Fi network in the PyeongChang Olympic Stadium failed. Internet-connected televisions in the main press centre stopped working. The Olympic Destroyer malware had spread through the Games' network, destroying data on Windows systems by overwriting boot records and deleting backup catalogues.

Initial analysis of the malware revealed code similarities with North Korean and Chinese threat actors — but Kaspersky researchers discovered that these similarities were deliberately planted false flags. The malware's metadata, code reuse patterns, and compilation artefacts had been carefully crafted to mislead attribution. The attack was ultimately attributed to Russia's GRU (specifically the Sandworm team), with the false flag operation interpreted as retaliation for the IOC's ban of Russia from the Games over its state-sponsored doping programme.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Cyber attribution is harder than it looks.

Deliberate Misdirection
Olympic Destroyer contained code sections copied from North Korean (Lazarus Group) and Chinese threat actors, compilation timestamps set to Chinese time zones, and metadata designed to mislead analysts. This was the most sophisticated false flag operation documented in a cyber attack and demonstrated that attribution based on code analysis alone is unreliable. <a href="https://www.cyber-defence.io/services/threat-intelligence">UK Cyber Defence's threat intelligence</a> provides multi-source attribution analysis.
International Events as Targets
The Olympics — a global sporting event intended to promote international cooperation — was attacked by a nation-state as political retaliation. For UK organisations hosting or supporting major international events, the Olympic Destroyer precedent means event-related IT infrastructure requires heightened security. Our <a href="/penetration-testing/infrastructure">infrastructure testing</a> includes event security assessments.
Destructive, Not Espionage
Like <a href="/blog/anatomy-of-a-breach-saudi-aramco-shamoon">Shamoon</a> and <a href="/blog/anatomy-of-a-breach-notpetya">NotPetya</a>, Olympic Destroyer was designed to destroy, not steal. The trend of nation-state destructive attacks — from Shamoon (2012) through NotPetya (2017) to Olympic Destroyer (2018) — demonstrates an escalating willingness to use cyber weapons for sabotage. <a href="/penetration-testing/infrastructure">Infrastructure testing</a> validates backup and recovery resilience.
Rapid Recovery
The Pyeongchang organising committee recovered from the attack within 12 hours — restoring the website and most services before the second day of competition. This rapid recovery was possible because of prepared incident response plans and tested backup procedures. <a href="https://www.cyber-defence.io/services/incident-response">UK Cyber Defence</a> provides the incident response planning that enables rapid recovery from destructive attacks.

Nation-states attack sports. And they lie about who did it.

Olympic Destroyer established two critical principles: first, international events are legitimate targets for nation-state cyber operations motivated by political grievances. Second, cyber attribution is not straightforward — sophisticated adversaries deliberately plant false evidence to mislead investigators and create diplomatic ambiguity. For UK organisations, this means that threat intelligence must be multi-sourced and analytically rigorous, and that event-related infrastructure requires proportionate security.

Infrastructure testing assesses event IT security and recovery procedures. Cyber Essentials establishes baseline controls. SOC in a Box provides 24/7 monitoring during events and high-threat periods. And UK Cyber Defence's threat intelligence provides the attribution analysis that cuts through false flags.


Russia attacked the Olympics and blamed North Korea. Is your event infrastructure defended?

<a href="/penetration-testing/infrastructure">Infrastructure testing</a> assesses event security. <a href="https://www.socinabox.co.uk">SOC in a Box</a> monitors during high-threat periods. <a href="https://www.cyber-defence.io/services/threat-intelligence">UK Cyber Defence</a> provides threat intelligence.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles