Fortinet reveals rising cyber threats targeting Paris 2024 Olympics
A recent threat intelligence report by Fortinet's FortiGuard Labs has highlighted the extensive cyber threats targeting the upcoming Paris 2024 Summer Olympics. According to the analysis, the Olympics attract cybercriminals due to the massive global audience and high-profile nature of the event. The report reveals a significant increase in cyberattacks on major events, from 212 million documented attacks at the London 2012 Games to 4.4 billion at the Tokyo 2020 Games.
Cybercriminals leverage these events for financial motives, including scams, digital fraud, and the theft of valuable data from attendees, viewers, and sponsors. FortiGuard Labs notes that fans' eagerness can make them particularly susceptible to risks when purchasing tickets, arranging accommodations, or buying memorabilia. Major events like these also draw criminals with political agendas seeking to disrupt services and gain media attention.
The report details several cyber threats specific to the Paris 2024 Games. Fortinet's proprietary analysis shows that the event has been a target for over a year, with attacks ranging from third-party breaches and phishing to malware and ransomware. Notably, there has been a substantial increase in cyber activities targeting French-speaking users and French infrastructure providers.
"Beginning the second half of 2023, we saw a surge in darknet activity targeting France," states the report. "This 80 per cent to 90 per cent increase has remained consistent across 2H 2023 and 1H 2024." The dark web continues to serve as a hub for these activities, with advanced tools and services accelerating data breaches and the gathering of personally identifiable information (PII). This information is often sold on the dark web, enabling unauthorised access to private networks and further criminal activities.
Hacktivist activity has also increased, particularly from groups linked to Russia and Belarus, who are not invited to this year's Games. Pro-Russian groups like LulzSec and Cyber Army Russia Reborn have explicitly stated their intention to target the Olympics. Other groups, including Anonymous Sudan and Team Anon Force from India, are also active in this space.
Threat actors are using phishing kits and information-stealer malware to launch attacks. Phishing kits provide novice cybercriminals with the tools to create convincing phishing emails while text-generating AI services eliminate common mistakes that might otherwise signal malicious intent. FortiGuard Labs has documented numerous typosquatting domains and fraudulent websites claiming to sell Olympic tickets. The French Gendarmerie Nationale has identified and shut down several such sites.
Information-stealer malware, such as Raccoon, Lumma, and Vidar, is also on the rise. Raccoon, an inexpensive Malware-as-a-Service (MaaS), is currently the most active in France, accounting for 59 per cent of all detections. This malware steals a range of sensitive information, including browser autofill data, credit card details, and cryptocurrency wallets.
FortiGuard Labs recommends various strategies to mitigate these threats. These include regular employee training on recognising social engineering lures and phishing attempts, public awareness campaigns, and the use of security orchestration tools. Organisations should also implement multi-factor authentication, deploy antivirus software, and maintain up-to-date software and operating systems with promptly applied security patches.
Further recommendations include deploying distributed denial-of-service (DDoS) protection, conducting robust threat-hunting activities, and leveraging cyber threat intelligence to gather real-time data on emerging threats. The report emphasises the importance of proactive measures to prevent ransomware attacks, website defacements, and other cyber threats targeting the Games.
While the Paris 2024 Olympics celebrate athleticism and sportsmanship, they also present a high-stakes target for cybercriminals, hacktivists, and state-sponsored actors.