The Russian influence operations aimed at the Paris Olympics 2024 differ in a number of meaningful ways from earlier campaigns, revealing a major evolution in tactics, technology, and strategic focus of the disinformation machine. It now looks more like a holistic, multihead hydra in an effort to maximize the impact and reach of disinformation efforts.
Perhaps most prominently, many of these operations integrate artificial intelligence (AI) technologies. AI complements and improves upon classic propaganda techniques:
This novel technology allows such messages to be more believable and personalized, and they’re, therefore, harder for audiences to pick apart.
The aesthetic has received an upgrade. Earlier efforts, based on cheap and amateur propaganda productions, pale in comparison with the level of professionalism seen in recent campaigns:
This shift marks a strategic view toward pleasing, involving content, but content that is able to make more effective claims on its viewers in new ways.
The influence operations are now leveraging a broader range of platforms and content formats. In addition to traditional media channels, they include:
Such a multi-platform strategy widens the sphere within which the operations could be carried out, and the more it captures the public’s attention, the harder it is to dismantle through countermeasures.
Initially focused on French-language content, the operations are now broadening their linguistic scope:
Enlarging the linguistic radius in this way will enable the operations to reach a more diverse audience and, in turn, may allow them to expand their global reach.
Unlike previous campaigns, which were primarily digital, there are concerns that the current operations may involve real-world actions:
This element adds a new dimension to the operations, blending online and offline tactics to enhance the overall impact.
The influence operations are adept at capitalizing on recent global issues to lend credibility and urgency to their messages:
Tying their narratives to ‘recent events du jour in the world,’ these campaigns gained an aura of credibility and currency that made them all the more compelling.
The operations that are currently prevalent are especially oriented toward fear-inducing matters such as violence and terrorism.
This kind of focus on fear is different from earlier disinformation attempts, which were more about eroding trust and credibility than about mobilizing fear.
The scope of these operations extends beyond the Olympics themselves:
This broader targeting strategy seeks political goals by impacting the social and political landscape in the host country.
This differs significantly from their past campaigns, which were much cruder. Using AI, better production values, and a multi-platform strategy, the Russian influence ops against the Paris Olympics 2024 and similar operations are vastly more effective and, moreover, more difficult to counter. The move to real-world provocation and to targeting major international events of the day lead in the same direction, towards generating real-world impact rather than just making noise or fomenting polarisation online. More reliance on fear and a broader targeting strategy demonstrate a truly all-out disinformation approach, full frontal and multi-channel, to the integrity and security of the Games.
Storm-1679 and Storm-1099 are distinct entities involved in Russian influence operations targeting the Paris Olympics 2024. These groups use a variety of tactics to undermine the credibility and security of the event, leveraging sophisticated techniques to manipulate public perception and spread disinformation. While both groups share a common goal, there are notable differences in their methods, sophistication, and areas of focus.
These differences highlight the multi-faceted nature of Russian influence operations targeting the Paris Olympics 2024, with each group playing a distinct role in the overall campaign. Understanding these distinctions is crucial for developing effective countermeasures and ensuring the integrity and security of the Games.
Threat intelligence plays an important role in cybersecurity, and it’s no different for the Paris Olympics 2024. We mentioned that one of the challenges in defending the Olympics is the diversity of threats at various scales. By providing timely, actionable information, threat intelligence can enable Paris Olympics 2024 to take preemptive action and bolster the security posture of the sports venue. Here are some ways to employ threat intelligence to protect the Olympics:
Using threat intelligence aligned with the information model, organizations can continuously monitor control systems, underlying networks, and the larger context from a wide range of information sources, including the dark web, social media, and attacker sites and forums. This can allow for early detection of potential cyber threats before they actually attack. For example, threat intelligence monitors could track communications from the People’s Cyber Army and NoName057(16), along with other groups of AI bots who have made explicit threats against the Olympics. With this insight, security teams can develop mitigation strategies before a risk materializes.
That requires understanding what happened before in attacks and threats, as well as what is happening currently. Threat intelligence helps anticipate where the next attack is most likely to come from, the tactics, techniques, and procedures that will be used by the human actors behind them, or, as we say, what a bad actor is seeking to exploit. For example, Distributed Denial-of-Service (DDoS) attacks, phishing, ransomware, and supply chain attacks are all possible threat vectors we commonly see in the intelligence we produce for clients. Based on this knowledge, we can prepare and strengthen defenses accordingly to make sure that any investment of time and money is focused on the most likely types of attacks.
To find anomalies (both regular so-called ‘normal’ anomalies as well as potential intrusions) in real-time across the network and system levels, we need to continuously monitor those two levels of abstraction. An effective detection strategy, therefore, employs advanced threat detection systems – state-of-the-art systems of signatures and patterns that can warn of unusual behavior that may otherwise not be detected by exception-based detection rules. For example, we would like to detect signature markers of malware, such as the Olympic Destroyer that hit systems at the 2018 PyeongChang Olympics, so that we can take immediate preventive actions in case of potential malicious intent.
Threat intelligence enables the development and application of targeted cybersecurity measures, such as the use of multi-layered protection measures (often termed ‘defense in depth’, such as firewalls, intrusion detection systems, and advanced encryption strategies), to protect systemic critical infrastructure, such as the power grid, and critical information held by governments, corporations, and individuals. Without insight into the nature of the threat, it is considerably more difficult to design and apply security measures effectively.
Integrating threat intelligence into incident response plans means that cyber incidents can be better handled, faster. Regular top-down cybersecurity drills and exercises based on realistic threat intelligence scenarios familiarise the security teams with the signs and symptoms of a real-world cyberattack and hasten response times and effectiveness. This enables the whole company to rehearse its incident response behaviours and allows teams to refine incident response strategies and ensure company-wide familiarity with cyber roles.
By sharing threat intelligence with law enforcement, sponsors, and any other cybersecurity company that could help, you’re helping maximize ‘collective defense in cyberspace,’ he says. In fact, the FrenchSSI, whose dedicated cybersecurity staff coordinates all stakeholders of the Paralympic and Olympic Games in Paris 2024. That way, everyone knows everyone else who’s behaving badly, as well as who is out there trying to stop them.
If one is able to identify a threat that is specifically targeting an Olympic sponsor or partner (such as Intel or Deloitte), you can ensure that those sponsors and partners take appropriate protective measures, as well. For example, if these organizations know that their security is the target of attacks, they’ll bolster their cybersecurity systems to protect their technology and services. Securing their components helps to secure the whole.
Processes related to critical infrastructure – including transportation, telecommunications, and event-management systems – will use threat and malware intelligence to detect potential compromise and prevent operational degradation. To shield attendees and athletes from potential data breaches and other operational failures, security teams will monitor the security of mobile apps and online platforms in real time. The intricate process of securing the Rio event illustrates the complex but necessary efforts that should be undertaken before, during, and after major events. While our research at VUB center C-mine focuses on the Tor anonymity network and other related technologies, our security recommendations can also be applied by threat-intelligence services, law enforcement agencies, and infrastructure providers, including transportation operators, accommodation providers, and retailers, among others.
Threat intelligence can be applied to detect and mitigate cybercriminal activities surrounding the event, especially financially motivated attacks like ticket scams and ransomware. Monitoring for fake websites and phishing campaigns during the Olympic ticket sales process and related financial transactions not only ensures that financial fraud is reduced but also protects the event’s revenue stream and helps to safeguard ticket buyers’ financial credentials.
With threat intelligence, the Paris 2024 Olympics will have the tools it needs to implement a well-thought-out cybersecurity strategy. Early detection of threats, awareness of the possible attack vectors, real-time analysis of events to quickly implement a corrective course of action, and support for improved defensive measures across different threat vectors are just some examples of how threat intelligence can aid in safeguarding the event. A comprehensive cybersecurity strategy, aided by threat intelligence, is required because cyber-attacks are targeted and not random. Figures can be misleading, as often the number of cyber-attacks is counted by the number of probes. However, in these cases, it is noteworthy that the target was of little significance. While cyber-attacks have become more common than in the past, attackers have become more selective about pursuing their intended targets. Threat intelligence helps to understand whether a specific target, like a sponsor or a segment of infrastructure vital to the Olympics or financial transactions, has been marked as an intended target of an attack. A proactive and informed cybersecurity strategy is crucial to ensure a safe Paris 2024 Olympics, thanks to threat intelligence.