{"id":21178,"date":"2024-07-19T11:31:06","date_gmt":"2024-07-19T18:31:06","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?p=21178"},"modified":"2024-10-22T09:49:21","modified_gmt":"2024-10-22T16:49:21","slug":"the-paris-olympics-are-coming-and-so-are-the-cyberthreats","status":"publish","type":"post","link":"https:\/\/webdev.securin.xyz\/articles\/the-paris-olympics-are-coming-and-so-are-the-cyberthreats\/","title":{"rendered":"The Paris Olympics are Coming. And so are the Cyberthreats."},"content":{"rendered":"\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

The Paris Olympic Games kick off on July 24th, and it\u2019s not only the athletes who\u2019ve been preparing: Head of IT Security for Paris 2024, Franz Ragule has said he expects at least ten times the number of attacks launched against the Tokyo Games in 2024 – and that was an estimated 450 million.\u00a0<\/span><\/p>

Based on what we\u2019ve learned from attacks on previous high-profile events, as well as comments from French authorities, Securin experts Kiran Chinnagangannagari<\/a> and Aviral Verma<\/a> gave their insights into some of the threats and approaches to expect\u2026<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t

\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t

What Types of Attack are Expected?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

Phishing: <\/b>\u00a0Attackers will seek to compromise everything from government agencies to event sponsors, official websites, ticketing and infrastructure that supports the event. Phishing attacks exploit a combination of human error and software vulnerabilities to gain a toehold into wider systems, from where further attacks and malware can be launched. On the one hand, we\u2019ll likely see scammers trying to commit credit card fraud or steal data, on the other, we can anticipate state actors seeking to access systems to disrupt. Phishing also plays a key role in ransomware attacks. <\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t

\n\t\t\t\t
\n\t\t\t\t\t\t\t

Ransomware:<\/b> ANSSI Director Vincent Strubel believes that ransomware attacks will be more intense around the Games, as cybercriminal groups believe organizations will be more likely to pay up to get things back on track as soon as possible. We\u2019re almost certain to see attacks targeting ticketing systems, networks for venues and results systems. And don\u2019t forget critical infrastructure like transport systems – at crucial times like these, threat actors would see an opportunity to cause maximum disruption and damage. Water, gas, electricity, mass transit, medical and emergency ecosystems are connected and are all potential targets.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t

\n\t\t\t\t
\n\t\t\t\t\t\t\t

DDoS: <\/b>France has already weathered multiple DDoS attacks on French government websites in recent months, it seems likely that we\u2019ll see more of the same during the Games. <\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t

\n\t\t\t\t
\n\t\t\t\t\t\t\t

Third Party Leverage: <\/b>A massive event like the Olympics involves orchestrating and co-ordinating disparate systems – contractors, sponsors, sponsor sites connected to the broader network etc – that\u2019s one big supply chain risk to manage – and cyber attackers (be they nation states, hacktivists or cybercriminal gangs) will be probing and testing and trying to exploit and weakness in that. The same holds for IoT devices and systems – e.g. surveillance devices like cameras, sensors, fire alarms – these should not be ignored as they can be an attack vector into sensitive networks and command and controls. They can also be used in DDoS attacks. <\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t

\n\t\t\t\t
\n\t\t\t\t\t\t\t

Misinformation and Social Chaos: <\/b>Attacks on information systems and use of deep fakes are important things for public safety leaders to pay attention to at large events. For example, the French Sports Minister\u2019s Twitter\/X account was hacked last week <\/a>\u00a0and used to send phishing messages. It\u2019s unclear whether this was a random\/lucky attack or something more serious, but it serves to underline the dangers.\u00a0<\/span><\/p>

French President Emmanuell Macron has said he has \u201cno doubt\u201d that Russia will target the Paris Olympics, with ANSSI Director Vincent Strubel pointing to the threat of state-orchestrated sabotage – and a potential flood of smaller scale attacks to distract from a larger one on critical infrastructure. In the past, we\u2019ve seen DDoS attacks used in this way – attempting to distract and divert resources to create space to launch more serious attacks. All of the attacks mentioned above will be 100 fold because of AI and the increased attack surface from all of these devices and services coming online for a large event. <\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t

\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t

Is this Type of Training France Experts are Doing on the Right Track? Should They Focus on Something Else?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

If they\u2019re preparing for 10 times the number of attacks as Tokyo, you can be sure they\u2019re looking at absolutely every scenario. The head of IT security for the Games, Franz Regul has made it clear that they\u2019re focusing on sabotage operations – and that significant resources, training and scenario planning\/simulations have gone into that – including keeping the location of their SecOps center secret. . There are reports of extensive training and simulation exercises to deal with ransomware and DDoS, with the country drawing on the services of ethical hackers, pentesters and auditors to seek out and expose any gaps. They\u2019re also using AI to run simulations and triage. All of this constitutes good strategy – the fact that this is being augmented with extensive training and distribution of clear written guidance for all participants and organizers adds the extra layer of dealing with human weakness.\u00a0<\/span><\/p>

Hosting the Rugby World Cup last year\u00a0 – and experiencing and mitigating attacks during that time – will have given them valuable insights and experiences, as well as the opportunity to test out any strategies developed with an eye on Paris. <\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t

\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t

How can International Agencies Support France in this Aspect?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

There\u2019s already co-operation with the USA – French officials have visited Washington to consult on security. From a broader industry and defender perspective, we can all contribute through continuous asset discovery and exposure of all assets connected to the internet. Avoid the low-hanging fruit that makes life easy for attackers: known vulnerabilities, default configurations, missing authentications, default passwords. And have rapid response teams on standby to recover and restore if and when an attack happens. <\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t

\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

Be proactive with your cybersecurity, talk with our experts<\/a> today.<\/h3>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"

The athletes aren\u2019t the only ones who\u2019ve been preparing. Both defenders and cybercriminals are ready for a face-off. Here\u2019s what to expect. <\/p>\n","protected":false},"author":1,"featured_media":21195,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[631],"tags":[],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/posts\/21178"}],"collection":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/comments?post=21178"}],"version-history":[{"count":15,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/posts\/21178\/revisions"}],"predecessor-version":[{"id":21196,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/posts\/21178\/revisions\/21196"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/media\/21195"}],"wp:attachment":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/media?parent=21178"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/categories?post=21178"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/tags?post=21178"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}