Radware Alert: Hacktivists Poised to Disrupt Paris 2024 Olympics with Cutting-Edge DDoS Attacks


July 18, 2024 06:00 PM

Radware’s cyberthreat intelligence (CTI) team assesses DDoS attacks targeting the digital infrastructure of the Paris 2024 Olympics.

Download

Overview

  • Radware’s cyberthreat intelligence (CTI) team assesses DDoS attacks targeting the digital infrastructure of the Paris 2024 Olympics.
  • Intelligence suggests hacktivists will create chaos by focusing on high-visibility targets like ticketing, streaming and betting platforms to advance their political agendas.
Radware Alert: Hacktivists Poised to Disrupt Paris 2024 Olympics

Background

  • In 2016, threat groups targeted public-facing properties and organizations affiliated with the Rio Olympic Games. They launched sustained, sophisticated, large-scale DDoS attacks that reached up to 540 Gbps and were fueled by an internet of things (IoT) botnet coupled with a few other botnets. These Olympics-related DDoS attacks used UDP reflection/amplification vectors to power a large portion of the attack volume. DNS, chargen, ntp, and SSDP were the main vectors, but direct UDP packet-flooding, SYN-flooding, and application-layer attacks targeting web and DNS services were also observed. The 2020 Tokyo Olympics witnessed an unprecedented 450 million attacks. For the 2024 Paris Games, the onslaught could be even worse.
  • In June 2024, Russian hacktivist groups HackNeT and the Cyber Army of Russia Reborn claimed a series of DDoS attacks against French websites (see Figures 1-4), including those of the La Rochelle International Film Festival and the Grand Palais. The Cyber Army of Russia Reborn, which Mandiant linked to the Kremlin, referred to these attacks as "training," suggesting they were testing their capabilities in preparation for larger-scale disruptions during the Olympics.

NoName057(16) Telegram post claiming attack on French sites as a warmup for attacks during the 2024 Paris Olympics Figure 1: NoName057(16) Telegram post claiming attack on French sites as a warmup for attacks during the 2024 Paris Olympics The Cyber Army of Russia Reborn Telegram post claiming attack on the largest Taxi and Transportation service in Paris Figure 2: The Cyber Army of Russia Reborn Telegram post claiming attack on the largest Taxi and Transportation service in Paris

Hacktivist Targeting Criteria

Hacktivists strategically select targets for maximum impact and visibility …

  1. Impact: Crippling services that generate a media firestorm and widespread frustration.
  2. Timing: Striking at peak moments to amplify disruption while minimizing resource needs.

At-risk sectors and industries include …

  1. Olympics logistics and operations:
    • Ticketing systems: Responsible for selling and distributing tickets to events.
    • Venue access control: Manage entry and security at Olympic facilities.
    • Hotel booking platforms: Handle accommodations for athletes, officials and spectators.
  2. Streaming and media:
    • Official Olympics streaming platforms: Provide live and on-demand coverage of events to global audiences.
    • Major broadcaster streaming services: Offer exclusive content and commentary to subscribers.
  3. Sports betting: Online sportsbooks allowing wagers on Olympic events and outcomes.
  4. Financial services: Payment processors facilitating transactions for tickets, merchandise and other Olympics-related purchases.
  5. Tourism and hospitality:
    • Airline booking systems: Manage travel arrangements for athletes, officials and spectators.
    • Hotel reservation platforms: Handle room bookings and guest services.
    • Travel websites and apps: Provide information and services for Olympics-related travel.
  6. Olympics-specific digital services:
    • Official Olympics mobile apps: Provide real-time event information, schedules, results, and updates to attendees and fans, serving as a central hub for engagement.
    • Volunteer coordination systems: Used to recruit, train, schedule and manage the large volunteer workforce supporting Olympics operations across venues and events.

The Cyber Army of Russia Reborn Telegram post calls to join them and NoName and attack Franch Bank Figure 3: The Cyber Army of Russia Reborn Telegram post calls to join them and NoName and attack Franch Bank

The Cyber Army of Russia Reborn Telegram post calls to join them and NoName and attack Franch Bank Figure 4: The Cyber Army of Russia Reborn Telegram post clamming attack on the French Film Festival

Potential Impact

  • Even a momentary outage can quickly spiral into a global media crisis, playing right into the hacktivists' hands.
  • Risks include serious safety threats, diplomatic firestorms, and long-term damage to the Olympic brand and partners.

Reasons for Heightened Concern

  1. Geopolitical tensions:
    • The war between Russia and Ukraine, tension between NATO and Russia upon new members joining the organization, and the ongoing conflict between Israel and Hamas in Gaza are both at critical stages that could determine the future of the Middle East and Europe. These conflicts fuel hacktivist groups, placing significant pressure on them to act.
  2. Hacktivists' innovative capabilities:
    • DDoS tools have entered a new era with AI-powered CAPTCHA-solving capabilities, enabling hacktivists to unleash staggering attack traffic volumes while staying hidden.
    • Traditional defenses will see these advanced threats as human traffic and won’t check it.

Staying Protected

EFFECTIVE DDOS PROTECTION ESSENTIALS

Intelligence on Active Threat Actors – High fidelity, correlated and analyzed data for preemptive protection against currently active known attackers

Behavioral-Based Detection - Quickly and accurately identify and block anomalies while allowing legitimate traffic through

Real-Time Signature Creation - Promptly protect against unknown threats and zero-day attacks

Cybersecurity Emergency Response Plan - A dedicated emergency team of experts who have experience with Internet of Things security and handling IoT outbreaks

Hybrid DDoS Protection – Use on-premise and cloud DDoS protection for real-time DDoS attack prevention that also addresses high-volume attacks and protects from pipe saturation

For further network and application protection measures, Radware urges companies to inspect and patch their network to defend against risks and threats.

EFFECTIVE WEB APPLICATION SECURITY ESSENTIALS

Low false positive rate - using negative and positive security models for maximum accuracy

Auto-policy generation - capabilities for the widest coverage with the lowest operational effort

Bot protection and device fingerprinting - capabilities to overcome dynamic IP attacks and achieve improved bot detection and blocking

Full OWASP Top-10 – coverage against defacements, injections, etc.

Flexible deployment options – on-premises, out-of-path, virtual or cloud-based

Securing APIs - by filtering paths, understanding XML and JSON schemas for enforcement, and using activity tracking mechanisms to trace bots and guard internal resources

LEARN MORE AT RADWARE’S SECURITY RESEARCH CENTER

To know more about today’s attack vector landscape, understand the business impact of cyberattacks, or learn more about emerging attack types and tools, visit Radware’s Security Research Center. Additionally, visit Radware’s Quarterly DDoS & Application Threat Analysis Center for quarter-over-quarter analysis of DDoS and application attack activity based on data from Radware’s cloud security services and threat intelligence.

Click here to download a copy of the ERT Threat Alert.

Download Now

Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Locations
Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support
Join the Radware Customer Program

Get Social

Connect with experts and join the conversation about Radware technologies.

Blog
Security Research Center
CyberPedia