We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information. If you reject, you will be taken back to the site you came from.
OUR ORIGINAL SERIES
Latest stories of our network
Security researchers described the code used to attack the 2018 Pyeongchang winter Olympics as 'Frankenstein-like.' In part two of our video series, hacker:HUNTER Olympic Destroyer, they explain how the malware was designed to point in multiple directions.
Who would dare to hack the Olympics?
The designer of an extraordinary piece of code lodged it in a system where it remained undetected for months. Part two of hacker:HUNTER Olympic Destroyer explores the nature of the attack, its process and why 'Frankenstein-like' code made it one of the most mysterious advanced persistent threat (APT) attacks in history.
Olympic Destroyer was the perfect example of an APT. What are they, and why are they so harmful?
APTs attack over time
APTs are sophisticated hacks that often wait for the perfect time to strike to create maximum damage. They lodge themselves in a system and steal critical data over weeks, months or years. Those behind these attacks build complex software for intentional damage – from espionage and sabotage to data theft.
Highly organized groups use APTs
APTs are notoriously associated with highly organized groups. They attack high-status targets like countries or large corporations, notably in manufacturing and finance, aiming to compromise high-value information like intellectual property, military plans and sensitive user data.
Their high-profile targets will have secure networks and defenses, so threats must stay undetected as long as possible. The longer the attack goes on, the more time attackers have to map the system and plan to steal what they want.
Motives behind attacks vary, from harvesting intellectual property to gaining advantage in an industry, to stealing data for use in fraud. One thing is clear: APTs cause severe damage.
The ‘perfect’ APT
Olympic Destroyer was the perfect APT. A highly-organized group attacked a national Olympic committee, and it worked.
The 'confusion bomb' had been undetected in the computer system for four months, biding its time to strike. Being in the system gave them time to find weak spots and pain points to make the attack more devastating. When it finally surfaced, all hell broke loose.
Crippling the whole IT system
By directly attacking the Olympics' data centers in Seoul, South Korea, Olympic Destroyer cut employees' access to network computers. Because Wi-Fi was out, Olympic building security gates stopped working, coverage stopped, and the whole infrastructure went offline. The Pyeongchang IT team was staring down the barrel of a potential geopolitical disaster.
Stay tuned for episode three, where we unravel the IT team's ingenious response and find out who did it. Any guesses? Go to hacker:HUNTER to stay up to speed.
4 Star Wars-inspired films for May the 4th
Lives today are linked to the world of Star Wars more than many realize
Today is Star Wars Day! What better way to celebrate the iconic movies than by checking out these 4 documentaries that show how Star Wars technology is becoming a daily reality. These short films explore the amazing possibilities of this moment in robotics, cryonics and human augmentation.
Imagine Beyond - The Body (above)
In the final scenes of The Empire Strikes Back, Luke Skywalker's hand – cut off by Darth Vader – is replaced in just 24 hours. Scientists across the world are now working on robotic limbs that can integrate with human bodies. Will we soon become superhuman?
Watch these videos to see how technology is making Star Wars-evoking strides into human augmentation, robotics and cryonics.
Unlocked: Is more tech inside making us better?
Should bionic augmentation aim to restore bodies, or add to them? Tilly Lockey, who has highly customized bionic arms, and Wojtek Paprota, with his implanted chip, discuss the possibilities and advantages of cyborgs and robotic upgrades.
Robotic Relationships: How we could fall in love with machines
Robotic relationships may be a turning point in the age of the machine. Can humans and AI connect on a deep emotional level?
Frozen in time: Is this how we will cheat death?
Eternal life might be possible sooner than we think. What will it mean for our bodies and society?
How will you celebrate Star Wars Day? Share your traditions with us on Twitter and Facebook!
Latest Stories
Gamers against the clock: Speedrunning esports
Ultra-fast gaming and the sports of tomorrow, with Break the Record's Fredrik Lidholt
Completing a game more quickly than opponents is the goal of the esport of speedrunning. It could be Super Mario, Doom or any other game. This week we'll see which elite players can break the speed record playing Minecraft.
Speed is the name of the game
The Break the Record Live Series is a live-streamed event where elite gamers compete to be the fastest ever player. Next week, they'll try to break the Minecraft speed-playing record. The brains behind Break the Record, Fredrik Lidholt (aka Edenal) chats about the future of esports with Marco Preuss and Rainer Bock in the latest episode of Unlocked.
Find out more about next week's Minecraft event here!
Let us know on Facebook and Twitter if you're tuning in and don't forget to tag Tomorrow Unlocked and the European Speedrunner Assembly!