Olympic Destroyer

Pictures about Olympic Destroyer

pyeong chang olympics opening ceremony feedyeti.comolympic destroyer feedyeti.comOlympic Destroyer feedyeti.comDV2I9ObW0AETPyD feedyeti.comOlympic Destroyer 1 feedyeti.comolympic destroyer malware feedyeti.comolympic destroyer cyberattack disrupted pyeongchang ceremony feedyeti.comw 2400 feedyeti.comolympic destroyer featured feedyeti.comolympic destroyer feedyeti.com49240E3100000578 0 image a 12 1518455583388 feedyeti.com2018 02 13T151216Z 3 LYNXMPEE1B1LJ RTROPTP 4 OLYMPICS 2018 CYBER feedyeti.comOlympic Destroyer 610x344 feedyeti.comFigure3 feedyeti.com574805 olympic destroyer sample feedyeti.com2018 02 09t143146z 1515439983 rc1d9018b2e0 rtrmadp 3 olympics 2018 opening feedyeti.com จู่โจมโอลิมปิก feedyeti.comFigure2 feedyeti.com


Best tweets:

Check Point Software 24/06/2018 10:29
#OlympicDestroyer #malware rises again via Cyber Talk: bit.ly/2K1GaV4  
http://pic.twitter.com/bLCs6qyVCz
#OlympicDestroyer #malware rises again via Cyber Talk:  http:// bit.ly/2K1GaV4     <br>http://pic.twitter.com/bLCs6qyVCz
This past winter, malware ripped through the Pyeongchang Olympics, disrupting Wi-Fi, shutting down the Olympics website, and causing generalized digital havoc. The so-called Olympic Destroyer attack gained infamy, too, for using a number of false flags to ...
KasperskyUK 24/06/2018 09:58
This weeks Kaspersky podcast dives into gaming addiction, #OlympicDestroyer malware, and how #WhatsApp is being blamed for the spread of #FakeNews Tune in! --> https://www. kaspersky.co.uk/blog/transatla ntic-cable-podcast-42/13858/   …
http://pic.twitter.com/KqJF1osBZu
This weeks Kaspersky podcast dives into gaming addiction, #OlympicDestroyer malware, and how #WhatsApp is being blamed for the spread of #FakeNews   Tune in! -->  https://www. kaspersky.co.uk/blog/transatla ntic-cable-podcast-42/13858/   … <br>http://pic.twitter.com/KqJF1osBZu
Olympic Destroyer, the threat actor that caused a crippling sabotage attack on the networks supporting this year’s Winter Games in Pyeongchang, South Korea, has resurfaced with a spy campaign – and with a wider target range. The new campaign began last ...
Kaspersky Lab 21/06/2018 01:30
The #OlympicDestroyer malware is widening its sphere of interest, according to new research https:// kas.pr/k5fi  
http://pic.twitter.com/2vWaT2zyf2
The #OlympicDestroyer malware is widening its sphere of interest, according to new research  https:// kas.pr/k5fi     <br>http://pic.twitter.com/2vWaT2zyf2
Olympic Destroyer, the malware that hit Pyeongchang 2018 Winter Olympics, is still alive and infecting new victims, according to a report published earlier today by Russian antivirus vendor Kaspersky Labs. The company's security researchers say they've ...
Joe Slowik 20/06/2018 11:53
Big unanswered question from the "OlympicDestroyer is back!" bit for me is: does the new activity include the destructive, wormable payload as observed in the event that gave this malware (group? whatever?) its name?
One of the key reasons the malware dubbed Olympic Destroyer was so successful in disrupting the Olympics was that it used this knowledge to sabotage the networks. The discovery of a new phishing campaign by the same group raises the possibility that they ...
Warren Mercer 20/06/2018 09:35
Since @r00tbsd and I named the destructive malware used against the Olympics 2018 we'd just like to clear up that #OlympicDestroyer is the name of the payload not the actor group. Attribution is difficult but confusing payloads with actors is even more so.
The advanced threat actor behind attempts to sabotage the 2018 Winter Olympics has resurfaced, researchers have warned, with its eyes set on a host of new targets. Relying on advanced forms of deception, Olympic Destroyer was a cyber sabotage attack rooted ...
WIRED 19/06/2018 09:59
Kaspersky Lab researchers say the group behind the infamous cyberthreat that struck the 2018 Winter Olympic Games has returned, with a new target: organizations that respond to and protect against biological and chemical threats https:// wired.trib.al/lCJks1c  
The Hacker News 19/06/2018 02:17
Hackers Who Hit Winter Olympics 2018 Are Still Alive and Kicking https:// thehackernews.com/2018/06/olympi c-destroyer-malware.html   … Researchers Track New "Olympic Destroyer" Attacks Targeting Biological & Chemical Threat Prevention Laboratories Across Europe.
http://pic.twitter.com/r7iJdGVXjL
Hackers Who Hit Winter Olympics 2018 Are Still Alive and Kicking   https:// thehackernews.com/2018/06/olympi c-destroyer-malware.html   …   Researchers Track New "Olympic Destroyer" Attacks Targeting Biological & Chemical Threat Prevention Laboratories Across Europe. <br>http://pic.twitter.com/r7iJdGVXjL
NETRESEC 19/06/2018 01:09
Word doc used in new #OlympicDestroyer campaign uses certutil.exe to download mysent[.]org/access.log.txt and save it as "%LOCALAPPDATA%\Microsoft\Windows\Caches\libsys.hta" (see screenshot from @HybridAnalysis) MD5: 0e7b32d23fbd6d62a593c234bafa2311 https://www. hybrid-analysis.com/sample/e9535d0 d5e8e17779b49607988cdb0547efb6abb482dab497a5f0da87cbefc96?environmentId=120   …
http://pic.twitter.com/VCRc7rHtKC
Word doc used in new #OlympicDestroyer campaign uses certutil.exe to download mysent[.]org/access.log.txt and save it as "%LOCALAPPDATA%\Microsoft\Windows\Caches\libsys.hta" (see screenshot from @HybridAnalysis)  MD5: 0e7b32d23fbd6d62a593c234bafa2311  https://www. hybrid-analysis.com/sample/e9535d0 d5e8e17779b49607988cdb0547efb6abb482dab497a5f0da87cbefc96?environmentId=120   … <br>http://pic.twitter.com/VCRc7rHtKC
Joe Security 19/06/2018 01:07
Swiss bio-chemical threat research conference in Spiez targeted by sample related to #OlympicDestroyer, DOC -> VBA -> powershell -> HTA -> powershell -> schtasks -> powershell -> HTA -> #Empire https:// buff.ly/2tlxnSH   #malware #dfir #infosec
http://pic.twitter.com/o5gZUl61Tx
Swiss bio-chemical threat research conference in Spiez targeted by sample related to #OlympicDestroyer, DOC -> VBA -> powershell -> HTA -> powershell -> schtasks -> powershell -> HTA -> #Empire   https:// buff.ly/2tlxnSH       #malware #dfir #infosec<br>http://pic.twitter.com/o5gZUl61Tx
APT Observatory 19/06/2018 12:48
#OlympicDestroyer The Spiez Convergence decoy makes slight mistakes when transforming original PDF into word document: A) Colouring of CH() flag is off B) Formatting of header is wrong C) FOCP is an abbreviation and is misplaced via @egflo
http://pic.twitter.com/YZvNyecbSQ
#OlympicDestroyer  The Spiez Convergence decoy makes slight mistakes when transforming original PDF into word document:   A) Colouring of CH() flag is off    B) Formatting of header is wrong    C) FOCP is an abbreviation and is misplaced  via @egflo<br>http://pic.twitter.com/YZvNyecbSQ
Catalin Cimpanu 19/06/2018 12:40
Malware That Hit Pyeongchang Olympics Deployed in New Attacks https://www. bleepingcomputer.com/news/security/ malware-that-hit-pyeongchang-olympics-deployed-in-new-attacks/   … #OlympicDestroyer #malware #APT
http://pic.twitter.com/P9ByTtXKbJ
Malware That Hit Pyeongchang Olympics Deployed in New Attacks  https://www. bleepingcomputer.com/news/security/ malware-that-hit-pyeongchang-olympics-deployed-in-new-attacks/   …  #OlympicDestroyer #malware #APT <br>http://pic.twitter.com/P9ByTtXKbJ
Tigzy  🛡 19/06/2018 11:56
#OlympicDestroyer sample available on malshare: https:// malshare.io/sample.php?has h=0e7b32d23fbd6d62a593c234bafa2311   …
http://pic.twitter.com/eoTb8bDi8s
#OlympicDestroyer sample available on malshare:  https:// malshare.io/sample.php?has h=0e7b32d23fbd6d62a593c234bafa2311   … <br>http://pic.twitter.com/eoTb8bDi8s
Eugene Kaspersky 19/06/2018 11:39
#OlympicDestroyer's deception efforts, changed the attribution game forever. It's is no longer possible to draw conclusions based on few attribution vectors. To resist such threats we need better cooperation between private sector & governments *across national borders*
Daniel Cid 19/06/2018 11:36
The #OlympicDestroyer is back. 1- It was first used to sabotage the organizers of the Olympic games in South Korea 2- It was made to look like it came from North Korea 3- It is now targeting Bio and Chem organizations 4- Used hacked Joomla sites. https:// securelist.com/olympic-destro yer-is-still-alive/86169/   …
http://pic.twitter.com/5fhilEl50N
The #OlympicDestroyer  is back.   1- It was first used to sabotage the organizers of the Olympic games in South Korea  2- It was made to look like it came from North Korea  3- It is now targeting Bio and Chem organizations  4- Used hacked Joomla sites.   https:// securelist.com/olympic-destro yer-is-still-alive/86169/   … <br>http://pic.twitter.com/5fhilEl50N
Eugene Kaspersky 19/06/2018 11:32
Location of targets in recent #OlympicDestroyer attacks:
http://pic.twitter.com/xmN5tWuTz6
Location of targets in recent #OlympicDestroyer attacks: <br>http://pic.twitter.com/xmN5tWuTz6
CCI 19/06/2018 11:32
New targets of #APT (cyber-sabotage attack) #OlympicDestroyer: Biological and chemical laboratories in Europe and Ukraine. https:// securelist.com/olympic-destro yer-is-still-alive/86169/   …
http://pic.twitter.com/m5FhABUWMv
New targets of #APT (cyber-sabotage attack) #OlympicDestroyer: Biological and chemical laboratories in Europe and Ukraine.  https:// securelist.com/olympic-destro yer-is-still-alive/86169/   … <br>http://pic.twitter.com/m5FhABUWMv
ANY.RUN 19/06/2018 11:29
Return of the #OlympicDestroyer, now it is targeting EU, Ukraine and Russia. Here the Interactive Analysis on ANY.RUN   : https:// app.any.run/tasks/f9148b25 -fd05-40d2-b939-3675866aa945   …
http://pic.twitter.com/HuRaIzYXHJ
Return of the #OlympicDestroyer, now it is targeting EU, Ukraine and Russia.  Here the Interactive Analysis on  http:// ANY.RUN     :  https:// app.any.run/tasks/f9148b25 -fd05-40d2-b939-3675866aa945   … <br>http://pic.twitter.com/HuRaIzYXHJ
Eugene Kaspersky 19/06/2018 11:25
#OlympicDestroyer is alive: our research shows #APT threat actor's interest in chemical and bio weapon protection entities in CH, DE, FR & RU. Details: https:// kas.pr/1vko  
http://pic.twitter.com/bl64GuIpET
Costin Raiu 19/06/2018 11:01
Malicious doc used in recent #OlympicDestroyer attacks references the Spiez Convergence conf: MD5: 0e7b32d23fbd6d62a593c234bafa2311 File Type: Microsoft Office Word Last saved date: 2018-05-14 15:32:17 (GMT) Known file name: Spiez CONVERGENCE.doc
http://pic.twitter.com/ScmQOwY3D7
Malicious doc used in recent #OlympicDestroyer attacks references the Spiez Convergence conf: MD5: 0e7b32d23fbd6d62a593c234bafa2311 File Type: Microsoft Office Word Last saved date: 2018-05-14 15:32:17 (GMT) Known file name: Spiez CONVERGENCE.doc <br>http://pic.twitter.com/ScmQOwY3D7
Kaspersky Lab 19/06/2018 10:59
#OlympicDestroyer is back - researchers find it targeting Europe and organizations that protect against bio and chem threats. Full story: https:// kas.pr/1vko  
http://pic.twitter.com/BHItNYplMz
#OlympicDestroyer is back - researchers find it targeting Europe and organizations that protect against bio and  chem threats. Full story:  https:// kas.pr/1vko     <br>http://pic.twitter.com/BHItNYplMz
Read More on Twitter