Search Results for: Cyber

Olympic Destroyer: The Cyberattack on the 2018 Winter Games

Getty Images

As the opening ceremonies of the 2018 Winter Olympics began, a cyberattack crippled the games’ digital infrastructure, jeopardizing WIFI connections, event tickets, and even the Olympics app, packed full of information on event schedules, maps, and hotel reservations. At Wired, in this excerpt from his book, Sandworm, Andy Greenberg unravels this digital whodunnit. Who was bent on creating chaos at the Olympics to publicly embarrass South Korea? Was it China? North Korea? Or was it Russia?

Over the next two hours, as they attempted to rebuild the domain controllers to re-create a more long-term, secure network, the engineers would find again and again that the servers had been crippled. Some malicious presence in their systems remained, disrupting the machines faster than they could be rebuilt.

A few minutes before midnight, Oh and his administrators reluctantly decided on a desperate measure: They would cut off their entire network from the internet in an attempt to isolate it from the saboteurs who they figured must still have maintained a presence inside. That meant taking down every service—even the Olympics’ public website—while they worked to root out whatever malware infection was tearing apart their machines from within.

For the rest of the night, Oh and his staff worked frantically to rebuild the Olympics’ digital nervous system. By 5 am, a Korean security contractor, AhnLab, had managed to create an antivirus signature that could help Oh’s staff vaccinate the network’s thousands of PCs and servers against the mysterious malware that had infected them, a malicious file that Oh says was named simply winlogon.exe.

At 6:30 am, the Olympics’ administrators reset staffers’ passwords in hopes of locking out whatever means of access the hackers might have stolen. Just before 8 that morning, almost exactly 12 hours after the cyberattack on the Olympics had begun, Oh and his sleepless staffers finished reconstructing their servers from backups and began restarting every service.

Amazingly, it worked. The day’s skating and ski jumping events went off with little more than a few Wi-Fi hiccups. R2-D2-style robots puttered around Olympic venues, vacuuming floors, delivering water bottles, and projecting weather reports. A Boston Globe reporter later called the games “impeccably organized.” One USA Today columnist wrote that “it’s possible no Olympic Games have ever had so many moving pieces all run on time.” Thousands of athletes and millions of spectators remained blissfully unaware that the Olympics’ staff had spent its first night fighting off an invisible enemy that threatened to throw the entire event into chaos.

Read the story

The Untold Story of the 2018 Olympics Cyberattack, the Most Deceptive Hack in History

Longreads Pick

As the opening ceremonies of the 2018 winter olympics began in Pyeongchang, a cyberattack targeted the games’ digital infrastructure, jeopardizing WIFI connections, event tickets, and even the official Olympics app, packed full of information on event schedules, maps, and hotel reservations. Andy Greenberg examines who was behind the attack and why they wanted to publicly embarrass South Korea.

Source: Wired
Published: Oct 17, 2019
Length: 32 minutes (8,126 words)

How to Catch a Cyber Sextortionist

Getty Images

While a student at Belmont High in Belmont, New Hampshire, Ryan Vallee — under the name of Seth Williamson — would initially befriend teen girls by texting them about their favorite ice cream or the name of their pets. They thought he was being sweet. He was after clues to their social network passwords. His aim? To hack their accounts in a bid to extort them for nude selfies. If he didn’t get what he wanted, his demands escalated.

The problem was that a lot of students were not reporting the behavior. They were trying to get through, heads down, not wanting to attract the wrong kind of attention. Seth’s victims seemed to share that trait. A girl named Mackenzie, who was harassed by Seth, told me that when she learned who a few of his other victims were, she realized that none were in the popular crowd. They were consigned to the insecure middle, where every misstep was perilous. Staying quiet seemed a reasonable choice.

As Stephanie Clifford reports at Wired, one by one, exasperated and terrified, the girls reported Seth Williamson to the police. When Raechel Moulton, Belmont’s only detective, realized she had a serial cyberstalker on her hands, she called in the Feds — who have far greater power to investigate cyberbullying than state officials. It was just a matter of sorting through his IP address trail before the sting took place.

RYAN VALLEE WASN’T one of the popular kids at Belmont High. But he had two advantages his victims did not. He was a boy, and therefore not as vulnerable to slut-shaming. And he understood how to harness technology to seem powerful, controlling and terrifying victims for years with only a smartphone and a computer.

This information was critical: It meant Vallee was back online, breaking the terms of his bail. Moreover, if agents could catch him with whatever device he was using, they would also have his browsing and messaging history. With evidence that strong, they could circumvent Vallee’s “some other dude” defense. The government got an order that required Facebook to deliver daily reports of IP addresses and login times for the M.M. Facebook page. Meanwhile, O’Neill took over Mackenzie’s Facebook. Copying the instant-messaging patois he learned from his teenage daughters, O’Neill posed as Mackenzie, alternately flirting, challenging, and being mad at him. “The more he talks, the more he logs in,” O’Neill said. “The more he logs in, we can identify where he is.”

Read the story

He Cyberstalked Teen Girls for Years—Then They Fought Back

Longreads Pick

While a student at Belmont High in Belmont, New Hampshire, Ryan Vallee — under the name of Seth Williamson — would initially befriend teen girls by texting them about their favorite ice cream or the name of their pets. They thought he was been sweet. He was after clues to their social network passwords. His aim? To hack their accounts in a bid to extort them for nude selfies. If he didn’t get what he wanted, his demands escalated.

Source: Wired
Published: Jun 24, 2019
Length: 20 minutes (5,243 words)

The Untold Story of NotPetya, the Most Devastating Cyberattack in History

Longreads Pick

In 2017, during an ongoing unofficial war, Russian targeted Ukraine with malware to test its cyberattack skills and possibly punish countries that did with business with Ukraine. In the process, it knocked out shipping and manufacturing throughout the world. By the time it was contained, the White House estimated the total damages at $10 billion dollars. Authorities say worse attacks are yet to come.

Source: Wired
Published: Aug 22, 2018
Length: 24 minutes (6,221 words)

Where are the Radical Politics of Cyberpunk?

Longreads Pick

As the long-anticipated video game Cyberpunk 2077 looms on the horizon (or begins to, at least) Cameron Kunzelman writes about how the politics of the cyberpunk genre are in its aesthetics, and considers what exactly it is those politics are.

Source: Waypoint
Published: Jul 6, 2018
Length: 7 minutes (1,809 words)

Cyberchondria: D.I.Y. Diagnosis in Overdrive

Longreads Pick

In researching his chronic headache on the web, veteran journalist Barry Newman takes a terrifying walk down the Via Dolorosa of digital self-diagnosis.

Source: Longreads
Published: Aug 10, 2016
Length: 10 minutes (2,698 words)

Cyberchondria: D.I.Y. Diagnosis in Overdrive

Illustration by: Ari Saperstein

Barry Newman | Longreads | August 2016 | 11 minutes (2,698 words)

 

My headache arrived just after April Fools’ Day, moving into orbit around my right eye, with side trips to the back of my neck. It was mild as headaches go, but persistent, there at bedtime, still there when I woke up. The previous autumn I’d had a cataract replaced by a wafer of plastic. Now I was in the eye surgeon’s exam chair for my six-month follow-up; this headache was three-weeks old.

Since the operation, I told the surgeon, my eyes seemed to be working to form a single image. “A lack of coordination,” I said. And now my head hurt. She pressed a lacquered fingernail to my forehead. “The headache is here, centered above the brow?” It was. “Maybe it’s from strain.”

“I assume it’s an aneurysm,” I joked. The surgeon said, “It sounds like strain,” and sent me away with the name and phone number of a neuro-ophthalmologist, for an expert opinion. Read more…

How to Friend Request Your Way Into a Cyber Posse of Unwitting Informants

The set-up was like something out of a movie—Four California Highway Patrol officers with little to no undercover experience decide to pose as Vegas players to take down motorcycle thieves in LA. Southern California’s street bike culture had made motorcycle theft a major problem in recent years, and so the officers would need to infiltrate the scene in order to pull off their sting. This is where things got tricky. Writing about the operation in Los Angeles Magazine, Greg Nichols details the creative way one of the officers gained credibility in the biker community:

With the team members in place, they set to work finding a second suspect. Scores of thieves were scooping up sport bikes around Los Angeles, but that didn’t make them easy to locate. Combing through Craigslist and eBay, the investigators scanned for ads containing suspicious language. Watson asked insurance companies to provide bike parts. Looking for leads, he and Clifford wrapped their inventory in cellophane, stepped into character, and went around to local motorcycle shops offering tidbits for sale or trade. Watson, always animated, did most of the talking. Clifford was younger, a good kid from a small town in Northern California. He was stiff at first, and cusswords tumbled out of his mouth with the overenunciated eagerness of a parent using slang. Incredulous shop owners sized up the short-haired white boys bearing gift-wrapped parts and said no thanks. The CHP had sprung for fake business cards, which the investigators passed out all over town, but nobody seemed eager to follow up with them.

Then Watson realized he had a teenager’s gift for social media. His humor and goofiness played well online. Watson joined motorcycle forums and set up a Facebook account to get close to club members. Men were slow to respond, but women seemed happy to accept his friend requests. The more female friends he acquired, the more the male bikers warmed to him. Soon he had a cyberposse of unwitting informants. Using those contacts, and cross-referencing frequent posters on Craigslist and eBay, the team discovered a likely suspect. When Clifford called about a Suzuki GSXR posted on Craigslist, the man introduced himself as Biscuit.

Read the story

The Secret Service Agent Who Collared Cybercrooks by Selling Them Fake IDs

Longreads Pick

Secret Service agent Mike Adams used the identity of a grifter named Justin Todd Moss to sell criminals fake IDs and build a case against them. The story behind the Secret Service’s long con:

“From the Secret Service’s standpoint, selling fake IDs – ‘novelties,’ in the parlance of the underground – would have held a number of advantages. Unlike intangible commodities like credit card numbers or passwords, fake IDs must be shipped physically, which gives the agency an address to check out for every customer. And, being photo IDs, the customer had to provide their photos. It’s a rare law enforcement operation that lets the cops collect mug shots before they’ve made a single arrest.

“‘It’s a great idea,’ says E. J. Hilbert, a former FBI cybercrime agent who worked undercover in the Carder Planet days. Feds routinely get close to carders by selling ‘stolen’ credit card numbers that are actually provided by card issuers, then tracked. Shipping counterfeit driver’s licenses, he says, has the same advantages.

“‘In fact, it’s even better,’ says Hilbert, now a managing director at Kroll Cyber. ‘You have one name and one ID that you can put in the system and flag. … I tried to get approval for this myself, and they wouldn’t do it.'”

Source: Wired
Published: Jul 22, 2013
Length: 14 minutes (3,636 words)