All Posts
Research
1
min read

The 2018 Winter Olympics in PyeongChang, South Korea and Impact to the Cyber Threat Landscape

The 2018 Winter Olympics are highly anticipated by fans and cyber criminals alike. This blog discusses the threats and political events to be aware of in preparation for the Games.
Published on
February 1, 2018
Table of Contents

Major events like the Winter Olympics attract a lot of attention from fans all around the world. For three weeks fans will watch in person, on televisions, and online to follow the various competitive events. This attention is attractive to advertisers but it’s also attractive to cyber criminals who will inevitably use the Games as lures for phishing and other social engineering campaigns. Threats related to the Winter Olympics go deeper than that, however.

Understanding the threat landscape related to events like the Olympics is one way to proactively identify threats ahead of any related compromise. It’s not hard to assume that phishing attacks will come that use the Olympics as a lure. Anyone who’s been in the security game for any period of time should know that drill pretty well. The more interesting pieces in the landscape puzzle are the sponsors, suppliers, and agencies that make the Olympics happen. A phishing lure to a supplier may not mention the Olympics at all but may instead lean on the relationship it has with another organization. Knowing this kind of attack was coming ahead of time helps organizations understand how to drive specific awareness around it. It also allows security teams to focus energy in places most likely to be impacted by such attacks.

Events like the Olympics are known far in advance. In the case of the 2018 Winter Olympics, the host city was chosen in July 2011. Planning began shortly thereafter with the creation of a coordination commission in August. Within a year of the announcement, activity was well underway to prepare for the Games. Details that trickled out via media stories and press releases could have armed potential attackers with valuable information for delivering targeted attacks long before the Olympics begin.

It is also important for defenders to understand the geopolitical forces at play in the region where the Games will be held. In the case of the Olympics in PyeongChang, the tensions between North and South Korea could play a role in any potential attacks (even if indirectly). North Korea may not have any interest in doing anything to disrupt the games but may be interested in a display of power during or near the timeframe of the Games. Given the recent agreement between North and South Korea regarding North Korea’s planned participation in the games, even this is now less likely. As always however, any entity with interests or activities that relate to South Korea or the Olympics should stay abreast of any changing developments in the region.

Another somewhat obvious angle to be aware of is the Russian doping scandal and expected fallout. Since the International Olympic Committee (IOC) banned Russia from participating in the 2018 Winter Olympics, the Fancy Bears’ Hack Team has released compromised emails and other documents from a number of doping related organizations and even the IOC. Their goal seems to be to exonerate Russia for its doping scandal by exposing what they believe to be similar abuses of banned substances across international athletics. Any organization related to doping, international athletics, or even athletes themselves should be aware of this activity and seek extra protections around their email accounts and sensitive documents.

Awareness is a big step in knowing where to look for attacks and signs of compromise. Understanding the threat landscape and how it changes over time helps keep defensive teams situationally aware and how to position defensive focus.

For a broader look at the threat landscape around the 2018 Winter Olympics in PyeongChang, South Korea, download our 2018 Olympics Report.

FEATURED RESOURCES

January 13, 2026
Anomali Cyber Watch

Anomali Cyber Watch: Cisco ISE Flaw, Ni8mare, N8scape, Zero-Click Prompt Injection and more

Anomali Cyber Watch: Cisco ISE Flaw Enables Arbitrary File Read via Administrative Access. Ni8mare and N8scape Vulnerabilities Expose n8n Automation Platforms to Full Compromise. Zero-Click Prompt Injection Abuse Enables Silent Data Exfiltration via AI Agents. Phishing Attacks Exploit Misconfigured Email Routing to Spoof Internal Domains. Ransomware Activity in the U.S. Continued to Rise in 2025. Android Ghost Tap Malware Drives Remote NFC Payment Fraud Campaigns. Black Cat SEO Poisoning Malware Campaign Exploits Software Search Results. MuddyWater Upgrades Espionage Arsenal with RustyWater RAT in Middle East Spear-Phishing. China-Linked ESXi VM Escape Exploit Observed in the Wild. Instagram Denies Data Breach Despite Claims of 17.5 Million Account Data Leak
Read More
January 6, 2026
Anomali Cyber Watch

Anomali Cyber Watch: OWASP Agentic AI, MongoBleed, WebRAT Malware, and more

Real-World Attacks Behind OWASP Agentic AI Top 10. MongoDB Memory Leak Vulnerability “MongoBleed” Actively Exploited. WebRAT Malware Spread via Fake GitHub Proof of Concept Exploits. Trusted Cloud Automation Weaponized for Credential Phishing. MacSync macOS Stealer Evolves to Abuse Code Signing and Swift Execution. Claimed Resecurity Breach Turns Out to Be Honeypot Trap. Cybersecurity Professionals Sentenced for Enabling Ransomware Attacks. Google Tests Nano Banana 2 Flash as Its Fastest Image AI Model. RondoDox Botnet Exploits React2Shell to Hijack 90,000+ Systems. Critical n8n Expression Injection Leads to Arbitrary Code Execution
Read More
December 23, 2025
Anomali Cyber Watch

Anomali Cyber Watch: SantaStealer Threat, Christmas Scams of 2025, React2Shell Exploit, Phishing via ISO, and more

SantaStealer Infostealer Threat Gains Traction in Underground Forums. From Fake Deals to Phishing: The Most Effective Christmas Scams of 2025. React2Shell Exploitation Expands With New Payloads and Broader Targeting. Russian Phishing Campaign Delivers Phantom Stealer via ISO Attachments. And More...
Read More
Explore All