Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • The Winter Olympics and Cybercrime: Caution Is Urged
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

The Winter Olympics and Cybercrime: Caution Is Urged

4 years ago Tripwire Guest Authors
The Winter Olympics and Cybercrime: Caution Is Urged

Hosting the Olympics is always a source of national pride for any nation chosen to do so. Whether in winter or summer, the prestige of the world’s eyes being on an event that transcends political differences and has sport at the fore is a prize many countries and regions aspire to achieve.

This all sounds fantastic and at one level is exactly what is happening at the 2022 Winter Olympics. However, at another level, any event that attracts large numbers of overseas visitors, high-ranking government and non-government organisation officials, as well as cutting edge technologies will attract unwanted attention. The Olympics provide a huge opportunity for those who want to exploit visitors and steal their data.

Opportunities for Cybercriminals

The FBI as well as the UK and several EU countries cyber agencies have emphasised the need for those traveling to the Olympics to exercise caution with “the download and use of applications, including those required to participate or stay in-country, as they could increase the opportunity for cyber actors to steal personal information or install tracking tools, malicious code, or malware.” The Canadian Olympic Committee noted that the games present “a unique opportunity for cybercrime,” as reported by the Reuters.

Those same agencies advised their athletes, training teams, and others to leave their personal devices at home or use temporary phones due to potential cybersecurity concerns at the Games. The devices they refer to include laptops, tablets, and any technologies with electronic processing and/or communications capabilities. Part of the reason for this is to reduce the possibility of any malicious actors being able to steal data from personal devices. But it also accounts for security concerns around an app that athletes need to download in order to compete at this year’s Games.

Indeed, due to the ongoing COVID-19 pandemic, athletes at this year’s games are required to download the ‘My 2022 app’ or a web browser version while in Beijing. Researchers at The Citizen Lab, a group based at the University of Toronto, found that the ‘My 2022 app’ had the potential to be infiltrated by cyber criminals. In addition to raising censorship concerns, the researchers also raised worries about where the sensitive information required by the app would end up.

The Dutch Olympic Committee went so far as to give their athletes new devices for use in China in order to protect teams from potential threats. Dutch Olympic Committee spokesman Geert Slot said that cybersecurity was part of the risk assessment made for the trip to China, adding that “the importance of cybersecurity has grown over the years,” as quoted by 7News. After all, we should remember in 2016 confidential medical files from WADA’s Anti-Doping Administration and Management System were stolen and the sensitive information within them leaked onto the internet.

Given that Olympians are at the top of their sporting prowess, their personal data, contacts, and connections as well as personal profile make them potentially at greater risk of being targeted online. Cyber criminals and other bad actors are spending more time building profiles of their targets so that attempts to compromise devices can be better focused through targeted malware delivered through sophisticated spear phishing attacks or malicious apps.

Staying Secure during the Winter Olympics

Key to helping to mitigate the risks discussed above is awareness of the potential threats and then the application of some basic cyber hygiene practices. The use of burner phones or devices when traveling is always good practice. Given the amount of data that modern devices can hold, not to mention the possible interconnectivity of multiple accounts on a single device, taking a device that has only the apps, contacts, and data you need maintains sensible separation between a personal and a purely professional device.

It’s also good practice to ensure operating systems are updated, to download apps only from approved sources, and to use Virtual Private Networks (VPNs). However, when it comes to apps and privacy products, you must remember if it is provided for free, then the users’ data tends to be the price paid. That’s why understanding the terms and conditions as well as what happens to personal data is important. For more corporate systems when traveling, account admins should audit logs for new user services along with the admin accounts within established systems.

Cyber vigilance should continue when individuals return home with greater awareness needed around potential phishing emails relating to their visit and any activities in the host country. Burner devices should be reset to factory settings and kept for use on the next trip but not connected to personal or work networks.

Critical to strong cyber safety is personal awareness of individual digital exposure. People know when to lock doors, put valuables in safes, and close curtains in the physical world. It is shocking how few people think the same in the digital and cyber world, yet it is as much an integral part of life today as anything else.


About the Author: Philip Ingram MBE is a former Colonel in British Military Intelligence and is now a journalist and international commentator on all matters security and cyber.

Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.

The post ” The Winter Olympics and Cybercrime: Caution Is Urged” appeared first on TripWire

Source:TripWire – Tripwire Guest Authors

Tags: COVID-19, Critical Severity, Exploit, Goverment, High Severity, Phishing, Privacy, TripWire

Continue Reading

Previous Experts Warn of Hacking Group Targeting Aviation and Defense Sectors
Next SafeDNS: Cloud-based Internet Security and Web Filtering Solution for MSPs

More Stories

  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

19 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk

21 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities

22 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

How Samsung Knox Helps Stop Your Network Security Breach

24 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

1 day ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Data Breach
  • Vulnerabilities

Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries

1 day ago [email protected] (The Hacker News)

Recent Posts

  • China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
  • CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
  • Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
  • How Samsung Knox Helps Stop Your Network Security Breach
  • Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT