Who wasn’t responsible for Olympic Destroyer?

Wednesday 3 October 15:00 - 15:30, Green room

Paul Rascagneres (Cisco Talos)
Warren Mercer (Cisco Talos)



This year's Winter Olympic Games took place in Pyeongchang, Korea. Several media outlets mentioned technical issues having occurred during the opening ceremony. In this presentation we will present the malware we have identified - with moderate confidence - as having been used in the attack. First, we will describe the malware's propagation techniques and its destructive capabilities. The second part of the presentation will be about attribution and how, in this particular case, the attacker included several false flags in order to point to well-known threat actors. The conclusion of the presentation will open the discussion about how hard attribution can be and our view concerning the future of this discipline.

 

 

Paul-Rascagneres-web.jpg

Paul Rascagneres

@r00tbsd

 

 

 

Warren-Mercer-web.jpg

Warren Mercer

@SecurityBeard

 

 

Related links


   Read paper    Watch video

Other VB2018 papers

Artificial intelligence to assist with ransomware cryptanalysis

Alexander Adamov (NioGuard Security Lab)

Little Brother is watching - we know all your secrets!

Siegfried Rasthofer (Fraunhofer SIT)
Stephan Huber (Fraunhofer SIT)
Steven Arzt (Fraunhofer SIT)

Draw me like one of your French APTs – expanding our descriptive palette for digital threat actors

Juan Andres Guerrero-Saade (Chronicle)

Back to VB2018 Programme page

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.