Podcasts about olympic destroyer

  • 15PODCASTS
  • 25EPISODES
  • 30mAVG DURATION
  • ?INFREQUENT EPISODES
  • Apr 30, 2023LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about olympic destroyer

Latest podcast episodes about olympic destroyer

The Lazarus Heist
S2.6 False flags

The Lazarus Heist

Play Episode Listen Later Apr 30, 2023 37:26


“He wrote me beautiful letters!” A “bromance” begins between President Trump and Kim Jong-un but how long will it last? The US president's former security advisor, Ambassador John Bolton, reveals what happens inside the summit room when the two leaders meet face to face. Plus, the Olympic Destroyer hackers are finally unmasked – but who are they? #LazarusHeist

The Lazarus Heist
S2.5 ‘Olympic Destroyer'

The Lazarus Heist

Play Episode Listen Later Apr 23, 2023 25:58


Hackers attack the Winter Olympics, during the opening ceremony in South Korea. Who is responsible? Fingers point to North Korea but it has joined forces with its neighbour and even sent a team. Why would they want to sabotage it? What's going on? #LazarusHeist

Malicious Life
Olympic Destroyer

Malicious Life

Play Episode Listen Later Apr 3, 2023 35:59


In the midst of 35,000 exhilarated spectators eagerly chanting the time-honored countdown to kick off the 2018 Pyeongchang Winter Olympics, a sinister malware crept through the games' network, threatening to disrupt the highly-anticipated event. The obvious question in everyone's minds was - who was responsible for the attack? Who was vile enough to launch such a potentially destructive attack against an event which, more than anything, symbolizes peace and global cooperation?Advertising Inquiries: https://redcircle.com/brands

Malicious Life
Olympic Destroyer

Malicious Life

Play Episode Listen Later Apr 3, 2023 36:00


In the midst of 35,000 exhilarated spectators eagerly chanting the time-honored countdown to kick off the 2018 Pyeongchang Winter Olympics, a sinister malware crept through the games' network, threatening to disrupt the highly-anticipated event. The obvious question in everyone's minds was - who was responsible for the attack? Who was vile enough to launch such a potentially destructive attack against an event which, more than anything, symbolizes peace and global cooperation?

Torched
Olympic Destroyer

Torched

Play Episode Listen Later Aug 2, 2022 35:30


To most, the 2018 Winter Olympic Games were an astounding success. But for the organizers and security personnel on the inside, it was a tense game of cat and mouse with the most dangerous cyber hackers in the world.

Armchair Investigators
#7 Olympic Destroyer — Der Cyber-Angriff auf die Olympischen Winterspiele 2018

Armchair Investigators

Play Episode Listen Later May 18, 2022 74:22


Was ist eine False-Flag-Operation? Wie bereiten staatliche Cyberkräfte eine Sabotage-Aktion mittels Wiper-Malware vor? Wie erleben Betroffene einen solchen Angriff und wie wehren sie ihn ab? In dieser Folge bereiten wir den Cyberangriff gegen die Olympischen Winterspiele 2018 in Südkorea auf und versuchen Antworten auf die oben genannten Fragen zu geben. Folgt uns auf eine Reise … „#7 Olympic Destroyer — Der Cyber-Angriff auf die Olympischen Winterspiele 2018“ weiterlesen

Research Saturday
Following DOJ indictment, a look back on NotPetya and Olympic Destroyer research.

Research Saturday

Play Episode Listen Later Dec 12, 2020 34:03


From US Department of Justice: "On Oct. 15, 2020, a federal grand jury in Pittsburgh returned an indictment charging six computer hackers, all of whom were residents and nationals of the Russian Federation (Russia) and officers in Unit 74455 of the Russian Main Intelligence Directorate (GRU), a military intelligence agency of the General Staff of the Armed Forces.  These GRU hackers and their co-conspirators engaged in computer intrusions and attacks intended to support Russian government efforts to undermine, retaliate against, or otherwise destabilize: (1) Ukraine; (2) Georgia; (3) elections in France; (4) efforts to hold Russia accountable for its use of a weapons-grade nerve agent, Novichok, on foreign soil; and (5) the 2018 PyeongChang Winter Olympic Games after Russian athletes were banned from participating under their nation’s flag, as a consequence of Russian government-sponsored doping effort.  Their computer attacks used some of the world’s most destructive malware to date, including: KillDisk and Industroyer, which each caused blackouts in Ukraine; NotPetya, which caused nearly $1 billion in losses to the three victims identified in the indictment alone; and Olympic Destroyer, which disrupted thousands of computers used to support the 2018 PyeongChang Winter Olympics. The indictment charges the defendants with conspiracy, computer hacking, wire fraud, aggravated identity theft, and false registration of a domain name." Returning to Research Saturday this week to discuss their research of NotPetya and Olympic Destroyer are Cisco Talos' Craig Williams and Matt Olney. The indictment and Cisco's research can be found here: Six Russian GRU Officers Charged in Connection with Worldwide Deployment of Destructive Malware and Other Disruptive Actions in Cyberspace New Ransomware Variant "Nyetya" Compromises Systems Worldwide The MeDoc Connection Who Wasn’t Responsible for Olympic Destroyer? Olympic Destroyer Takes Aim At Winter Olympics

The CyberWire
Following DOJ indictment, a look back on NotPetya and Olympic Destroyer research. [Research Saturday]

The CyberWire

Play Episode Listen Later Dec 12, 2020 34:03


From US Department of Justice: "On Oct. 15, 2020, a federal grand jury in Pittsburgh returned an indictment charging six computer hackers, all of whom were residents and nationals of the Russian Federation (Russia) and officers in Unit 74455 of the Russian Main Intelligence Directorate (GRU), a military intelligence agency of the General Staff of the Armed Forces.  These GRU hackers and their co-conspirators engaged in computer intrusions and attacks intended to support Russian government efforts to undermine, retaliate against, or otherwise destabilize: (1) Ukraine; (2) Georgia; (3) elections in France; (4) efforts to hold Russia accountable for its use of a weapons-grade nerve agent, Novichok, on foreign soil; and (5) the 2018 PyeongChang Winter Olympic Games after Russian athletes were banned from participating under their nation’s flag, as a consequence of Russian government-sponsored doping effort.  Their computer attacks used some of the world’s most destructive malware to date, including: KillDisk and Industroyer, which each caused blackouts in Ukraine; NotPetya, which caused nearly $1 billion in losses to the three victims identified in the indictment alone; and Olympic Destroyer, which disrupted thousands of computers used to support the 2018 PyeongChang Winter Olympics. The indictment charges the defendants with conspiracy, computer hacking, wire fraud, aggravated identity theft, and false registration of a domain name." Returning to Research Saturday this week to discuss their research of NotPetya and Olympic Destroyer are Cisco Talos' Craig Williams and Matt Olney. The indictment and Cisco's research can be found here: Six Russian GRU Officers Charged in Connection with Worldwide Deployment of Destructive Malware and Other Disruptive Actions in Cyberspace New Ransomware Variant "Nyetya" Compromises Systems Worldwide The MeDoc Connection Who Wasn’t Responsible for Olympic Destroyer? Olympic Destroyer Takes Aim At Winter Olympics

Security Stories
20: Creating safe spaces, and the troubling nature of attribution in threat research, with Chloé Messdaghi and Warren Mercer

Security Stories

Play Episode Play 48 sec Highlight Listen Later Nov 23, 2020 66:41


In today's episode we're delighted to welcome Chloé Messdaghi, an infosec advocate and activist who is working to create a safe space for underrepresented groups within the industry.Chloé is the CEO and founder of We are Hackerz, as well as the cofounder of Hacking is not a crime, Women of Security and The Hacker Book Club, and she is also VP of Strategy at Point3 Security.We chat about the growing issue of burnout and how people can spot the signs within themselves and others. Chloé also reveals how she comes up with her ideas, and how she is seeking to address certain issues in the cybersecurity industry such as women and underrepresented groups being trolled online. Plus, we discuss the fight for the truth in a growing age of misinformation.Our second guest is Warren Mercer, a threat researcher from Cisco Talos who helped to discover the Olympic Destroyer attack in 2018. Warren is in the studio with Ben and Hazel to discuss the research he’s being doing on the evolution of Remote Access Trojans, and one of the newest players, Poetrat. We also discuss his starring role in the new multi part documentary by Tomorrow Unlocked, called 'Who hacked the 2018 Winter games’. That then brings us onto the topic of why attribution is so difficult in the threat landscape, and what some of the consequences are of misattribution.

Darknet Diaries
77: Olympic Destroyer

Darknet Diaries

Play Episode Listen Later Oct 27, 2020 49:02


In February 2018, during the Winter Olympics in Pyeongchang South Korea, a cyber attack struck, wiping out a lot of the Olympic’s digital infrastructure. Teams rushed to get things back up, but it was bad. Malware had repeatedly wiped the domain controllers rendering a lot of the network unusable. Who would do such a thing? We will talk with Andy Greenberg to discuss Olympic Destroyer, a chapter from his book Sandworm (affiliate link). Sponsors Support for this show comes from Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and get a special offer. Support for this show comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up.

The CyberWire
Special Edition — Andy Greenberg from WIRED on his book "Sandworm."

The CyberWire

Play Episode Listen Later Nov 11, 2019 26:37


In this CyberWire special edition, a conversation with Andy Greenberg, senior writer at WIRED and author of the new book "Sandworm -  A New Era of CyberWar and the Hunt for the Kremlin’s Most Dangerous Hackers." It’s a thrilling investigation of the Olympic Destroyer malware, and an accounting of the new era in which we find ourselves, where nation states can target their adversaries critical infrastructure, and the often unintended consequences that follow. Thanks to our sponsors McAfee, the device-to-cloud cybersecurity company. 

WIRED Security: News, Advice, and More
Security News This Week: The Air Force Finally Ditches Its Nuclear Command Floppy Disks

WIRED Security: News, Advice, and More

Play Episode Listen Later Oct 23, 2019 4:43


The first thing you should read about cybersecurity this week, if you somehow haven't already, is this in-depth look at Olympic Destroyer, the malware that plagued the Pyeongchang Olympics. An excerpt from WIRED senior writer Andy Greenberg's upcoming book Sandworm, the feature from our November issue details how investigators figured out who was behind the attack—a trickier puzzle to solve than you might think.

Digitaal | BNR
Japanse IoT-strategie

Digitaal | BNR

Play Episode Listen Later Jan 30, 2019 20:58


Japanse burgers die hun Internet of Things-apparaten slecht hebben beveiligd, kunnen binnenkort worden gehackt door hun eigen overheid. Daarvoor heeft het land wetgeving aangenomen. Volgend jaar vinden in Tokio de Olympische Zomerspelen plaats en de Japanners zitten niet te wachten op malware zoals Olympic Destroyer.

The CyberWire
Nation-state cyber campaigns: North Korean, Iranian, Russian, and unknown. Social media outages.

The CyberWire

Play Episode Listen Later Nov 20, 2018 19:56


In today’s podcast, we hear about nations behaving badly (but from the point-of-view of cyberespionage they’re doing, unfortunately, well). The Lazarus Group is back robbing banks in Asia and Latin America. Russia’s Hades Group, known for Olympic Destroyer, is back, too. Gamaredon and Cozy Bear have returned, respectively pestering Ukraine and the US. Iran’s OilRig is upping its game with just-in-time malicious phishbait. And it’s not you: Facebook has been down. Malek Ben Salem from Accenture Labs on skills squatting with Amazon’s Alexa. Guest is Ronnie Tokazowski from Flashpoint on his work with the business email compromise working group.

WIRED Security: News, Advice, and More
The Olympic Destroyer Hackers May Have Returned For More

WIRED Security: News, Advice, and More

Play Episode Listen Later Jun 21, 2018 4:28


This past winter, malware ripped through the Pyeongchang Olympics, disrupting Wi-Fi, shutting down the Olympics website, and causing generalized digital havoc. The so-called [Olympic Destroyer attack](https://www.wired.com/story/olympic-destroyer-malware-pyeongchang-opening-ceremony/] gained infamy, too, for using a number of false flags to muddy attribution.

The CyberWire
Charges in Vault 7 case. Olympic Destroyer appears to be back. Liberty Life hack. Does Tesla have a rogue insider? US Senate hits at ZTE. Guilty plea in OPM hack-related fraud. Motive: blackmail.

The CyberWire

Play Episode Listen Later Jun 19, 2018 19:57


In today's podcast we hear that the US has charged a former CIA engineer in the WikiLeaks Vault 7 case. Olympic Destroyer may be back, and preparing to hit chemical weapons investigators and arms control specialists. Updates on the Liberty Life data extortion investigation. Elon Musk says Tesla Motors has an internal saboteur. The US Senate snatches the lifeline out of ZTE's hands. A guilty plea in OPM-breach-related fraud. A possible motive in the Jeopardy champ's email hacking. David Dufour from Webroot with insights on the impact they’re seeing from GDPR. Guest is Lenny Zeltser from Minerva Labs discussing his IT and security “cheat sheets.” 

Kurz informiert – die IT-News des Tages von heise online
Kurz informiert vom 09.03.2018: Samsung Galaxy S9 & S9+, Olympic Destroyer, Saturn, Twitter-Inhalte

Kurz informiert – die IT-News des Tages von heise online

Play Episode Listen Later Mar 8, 2018


Samsung Galaxy S9/S9+: Test der High-End-Smartphones Nach knapp drei Tagen im c't-Testlabor fällt die Redaktion ein erstes Urteil über das Samsung Galaxy S9 und S9+: Es sind tolle Smartphones mit Detailverbesserungen. Äußerlich hat sich beim S9 und S9+ nur die Position der Kamera und des Fingerabdruckscanners an der Rückseite geändert. Unter der Haube hat Samsung vor allem Prozessor, Kamera und Lautsprecher verbessert. Olympic Destroyer: Hackerangriff auf die Olympischen Spiele lief unter falscher Flagge Während der Eröffnungsfeier der Olympischen Spiele in Südkorea kam es zu einem Angriff auf die IT-Infrastruktur der Veranstalter. Wurden zunächst Angreifer aus Nordkorea verdächtigt, ging man später von Angreifern aus Russland aus. Als Motiv wurde Rache für den Ausschluss russischer Athleten nach Dopingvorwürfen vermutet. Neue Erkenntnisse von Sicherheitsforschern der Firma Kaspersky, die Zugang zu der Malware hatten, legen jedoch jetzt nahe, dass der Angriff wohl nur eine Übung war, anderen einen Cyberangriff in die Schuhe zu schieben. Elektrohändler Saturn eröffnet ersten kassenlosen Markt Einkaufen ohne Wartezeit an der Kasse: Der Elektroriese Saturn hat am Donnerstag im österreichischen Innsbruck seine erste kassenlose Filiale eröffnet. Das Unternehmen will damit den stationären Handel besser mit dem Geschäft im Netz verbinden. Kunden können bei dem Pilotprojekt das gewünschte Produkt direkt am Regal bezahlen und den Laden verlassen. Möglich sei dies durch eine App, die den Preis der Waren scanne und den Bezahlvorgang via Kreditkarte oder PayPal regle, teilte das Unternehmen mit. Studie: Unwahre Twitter-Inhalte verbreiten sich schneller als die Wahrheit Viele Menschen lieben Gerüchte und aufregende Neuigkeiten. Das schlägt sich auch auf Twitter nieder. Manchmal verbreiten sich dann auch unwahre Inhalte rasend schnell. US-Forschern vom MIT zufolge hat ein unwahrer Inhalt – etwa ein Bild, eine Behauptung oder ein Link zu einem Onlineartikel – eine um 70 Prozent höhere Wahrscheinlichkeit, weiter verbreitet zu werden. Ob die untersuchten unwahren Behauptungen und Nachrichten mit Absicht verbreitet wurden, nahm die Studie aber nicht unter die Lupe. Diese und alle weiteren aktuellen Nachrichten finden Sie auf heise.de

Recorded Future - Inside Threat Intelligence for Cyber Security

The 2018 Olympic Games in PyeongChang recently concluded, but not without attempts at disruption from cyberattackers. A major telecom and IT provider was targeted with a multi-pronged campaign to gather credentials, move laterally within networks, and destroy data. It borrows bits of code from previously known campaigns, and was an aggressive effort to spread quickly and cause maximum damage to systems. Greg Lesnewich is a threat intelligence analyst with Recorded Future’s Insikt Group, and he joins us to provide an overview of the malware campaign named Olympic Destroyer. We’ll get technical details, as well as a sense for why attribution is notoriously difficult in cases like this, and whether or not we’re seeing evidence of a false flag operation.  

Inside Security Intelligence
046 False Flags From Olympic Destroyer

Inside Security Intelligence

Play Episode Listen Later Mar 5, 2018 17:23


The 2018 Olympic Games in PyeongChang recently concluded, but not without attempts at disruption from cyberattackers. A major telecom and IT provider was targeted with a multi-pronged campaign to gather credentials, move laterally within networks, and destroy data. It borrows bits of code from previously known campaigns, and was an aggressive effort to spread quickly and cause maximum damage to systems. Greg Lesnewich is a threat intelligence analyst with Recorded Future's Insikt Group, and he joins us to provide an overview of the malware campaign named Olympic Destroyer. We'll get technical details, as well as a sense for why attribution is notoriously difficult in cases like this, and whether or not we're seeing evidence of a false flag operation.  

Beers with Talos Podcast
Eternal Fauxmance: Attribution Easter Eggs

Beers with Talos Podcast

Play Episode Listen Later Feb 22, 2018 56:37


Recorded 2/16/18 - This week, Mitch learns about starting a show without Matt with no other plans to control Craig in place. The team discusses Olympic Destroyer and then takes on attribution in light of recent developments with Nyetya. We look at what attribution actually takes and the ease and commonality of planting false flags.

The CyberWire
The complexities of Olympic Destroyer. More blame for Russia in the matter of NotPetya. Congress mulls election security. New York cyber milestone. Ed Snowden as phishbait.

The CyberWire

Play Episode Listen Later Feb 16, 2018 22:45


In today's podcast, we hear more about Olympic Destroyer: its relationship status with known threat actors is "complicated." The US joins the UK in blaming Russia for NotPetya, and seems to be considering sanctions. The US Congress considers election security, and considers a state-level option: let governors call in the National Guard. New York cyber law reaches its second milestone. Zulfikar Ramzan from RSA, discussing the hype around blockchain technology. Guest is Jack Rhysider, producer and host of the Darknet Diaries podcast.  And no, Edward Snowden has not moved in down the block and bought a two-terabyte iCloud storage plan. 

The CyberWire
Olympic Destroyer took its time, compromised the IT supply chain. NotPetya attribution. Coin scams. Coin miners. Botnets old and new.

The CyberWire

Play Episode Listen Later Feb 15, 2018 18:57


In today's podcast we hear that Olympic Destroyer may have started with a supply-chain compromise back in December. The British Foreign Office blames Russia for NotPetya pseudoransomware, and the Russian Foreign Ministry says they didn't do anything. Trend Micro researchers find a new Monero cryptomining campaign underway. Coinherder phishes in alt-coin wallets. The Satori botnet has expanded its target list. A new IoT botnet, DoubleDoor, gets into routers with a one-two punch. Ben Yelin from UMD CHHS, on New Jersey taking on the FCC and net neutrality.  Guest is Scott Register from Ixia on security issues with the coming 5G cellular rollout. And the LoopX ICO vanishes into thin air. 

The CyberWire
Olympic Destroyer updates. Cyber forecasts from the US Intelligence Community. Patch notes. Cryptojacking and coinming. Ad blockers (also an incentive to coin mining).

The CyberWire

Play Episode Listen Later Feb 14, 2018 18:58


In today's podcast, we hear that Olympic Destroyer exploits EternalRomance and morphs as it moves from machine to machine. Other Olympic hacks are out there, too. The US Intelligence Community tells Congress to expect a more assertive Iran, Russia, and North Korea in cyberspace. They also forecast more election influence operations. General Nakasone has been nominated to succeed Admiral Rogers at NSA and US Cyber Command. Yossi Oren from BGU on two-factor authentication for the disabled. Guest is John Kuhn from IBM X-Force Iris on the uptick in spam around the Valentine’s Day holiday.Coin mining continues to make a nuisance of itself. 

The CyberWire
Patch Tuesday notes. Skype DLL hijacking vulnerability. Olympic Destroyer malware described. Lazarus Group newly active. BitGrail heist? Cyber Valentine.

The CyberWire

Play Episode Listen Later Feb 13, 2018 18:17


In today's podcast, we hear that Patch Tuesday will not include a Skype fix—that one will take some time and attention. Olympic Destroyer is the malware thought to be infesting the Winter Games. Attribution remains unclear, but a lot of suspicious eyes are looking at you, Mr. Putin.  The Lazarus Group is stepping up its cryptocurrency stealing game. Questions swirl around the alleged BitGrail cryptocurrency exchange losses. David Dufour from Webroot on Mac vulnerabilities. Guest is Mark Loveless from Duo security, looking at IoT personal safety devices.  And, hey—Valentine's Day is tomorrow. 

Malicious Life
Olympic Destroyer

Malicious Life

Play Episode Listen Later Jan 1, 1970 35:59


In the midst of 35,000 exhilarated spectators eagerly chanting the time-honored countdown to kick off the 2018 Pyeongchang Winter Olympics, a sinister malware crept through the games' network, threatening to disrupt the highly-anticipated event. The obvious question in everyone's minds was - who was responsible for the attack? Who was vile enough to launch such a potentially destructive attack against an event which, more than anything, symbolizes peace and global cooperation?Advertising Inquiries: https://redcircle.com/brands