Threat Trends | 3 mins

Paris 2024 Olympics Begins with  Cybersecurity Warnings

Although most of the world is excitedly preparing for the Paris 2024 Olympics is expected to begin on the 26th of July, the cybersecurity community is on high alert. Major sporting events are frequently the target of cyber attacks, which can disrupt the proceedings, defraud attendees, and cause millions of dollars in damages. To give a sense of scale, the 2020 Tokyo Olympics was reportedly targeted by 450 million attacks.

To prepare for the increased number of attacks, IDC is reporting that, organizations in Europe will increase spending on cybersecurity services by US$ 150M in 2024 to mitigate Games-related risks. "Safeguarding privacy and ensuring robust cybersecurity measures is key,” said Jorge Oliveira e Carmo, FIFA Head of Data Protection & Cybersecurity Risk.

However, the attack surface of major sporting events is far larger than it may seem. Cybercriminals also target transportation networks, drinking water systems, hotels, and many other industries. This larger ecosystem must also prepare for a surge in the number of cyberattacks during the Paris Olympics.

Paris Olympics and the larger cyber threat

According to the French government’s cybersecurity agency, ANSSI, there are about 500 critical companies, organizations, and facilities integral to the seamless execution of the Games. These entities span various sectors, including local governments, energy, transport, and water management. 

The failure of these systems could have significant ramifications on multiple competitions. To mitigate these risks, ANSSI has been conducting thorough audits of their cybersecurity systems, ensuring robust defenses are in place, reported Bloomberg.

According to the report, ANSSI has mobilized a dedicated task force of 630 employees to tackle the formidable task of securing the Games. Furthermore, the International Olympic Committee has launched a cyber assistance website that provides clear guidelines on identifying and combating targeted campaigns. The obvious attack vector: phishing!

Phishing domains, Paris Olympics special!

Researchers across the world started spotting typosquatting domains related to the Olympics as soon as sponsor businesses started advertising. These most common destinations these deceptive domains lead to are cloned ticket websites, where victims are tricked into entering payment details without receiving tickets, losing their money in the process. 

By mid-June, the French military’s law enforcement branch, Gendarmerie Nationale, collaborating with Olympic partners, identified 338 fraudulent websites selling fake Olympic tickets, shutting down 51 sites and issuing formal notices to 140 others, reported TechRadar.

In addition to ticket scams, several Olympic-themed lottery scams have emerged, impersonating major sponsor brands. Moreover, researchers have spotted a notable increase in services facilitating phishing attacks. 

Need for proactive security

Major sponsor companies have received advisories on setting up a proactive cybersecurity posture, particularly by auditing for vulnerabilities to cover direct attacks. Based on the attacks we studied, detected, and prevented, the Hadrian team advises these steps:

Organizations associated with the Olympics can improve their cybersecurity by focusing on continuous asset discovery and vulnerability management. Continuous asset discovery helps maintain an up-to-date inventory of IT assets, allowing for effective monitoring of the attack surface and timely identification of vulnerabilities. Prioritizing the elimination of critical risks and using automated penetration testing to simulate real-world cyberattacks further strengthens the network's resilience.

In addition, 3rd party risk monitoring and compliance reporting automation are essential. Monitoring the cybersecurity posture of third-party vendors and automating compliance reports ensure timely adherence to industry standards and defense against supply chain attacks. 

Enhancing IoT & OT visibility, detecting cloud misconfigurations, and employing DNS monitoring are crucial for securing all connected devices, preventing exposures in cloud systems, and stopping phishing and brand abuse.

Let the games begin. Meanwhile, watch out for that suspicious text message and email!

Newsletter sign up

Get insights directly to your inbox

Subscribe to our newsletter for blog recaps, fresh tips, insights, and resource downloads.

Newsletter Example