Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries

February 6, 2026

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026

New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

February 6, 2026
Facebook X (Twitter) Instagram
Friday, February 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Phishing and Spoofed Sites Remain Primary Entry Points For Olympics
News

Phishing and Spoofed Sites Remain Primary Entry Points For Olympics

Team-CWDBy Team-CWDJanuary 21, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A new assessment of cyber risks facing the Milano-Cortina 2026 Winter Games has highlighted phishing and spoofed websites as the most common initial access points for attackers targeting global sporting events. 

The findings have been detailed in Palo Alto Networks’ Cyber Threats to Milan-Cortina 2026 report, which examined how criminal groups, state-backed actors and hacktivists are likely to exploit the Games’ vast digital footprint.

The research draws on recent Olympic history. During the Pyeongchang 2018 games, attackers disrupted WiFi and digital infrastructure. Ahead of Tokyo 2021, Russian-linked groups attempted to interfere with pre-Games operations. At Paris 2024, analysts observed spikes in DDoS activity, Olympics-themed phishing and online scams. With more than 3 billion viewers expected for Milano-Cortina, the incentives remain high.

The Palo Alto report emphasized how attackers blend speed with deception. Phishing campaigns, often tied to business email compromise (BEC), continue to dominate the early stages of intrusions. Researchers noted that 76% of observed phishing cases relied on BEC, exploiting trust between staff, partners and suppliers across the Olympic ecosystem.

“The biggest risks to large events like the Olympics don’t come from new exploits,” Randolph Barr, CISO at Cequence Security, said. “Instead, they originate from people misusing legitimate apps, identities and corporate processes.”

Common Tactics Observed Around the Games

The Games attract a broad mix of threat actors. Financially motivated ransomware gangs see ticketing platforms, event websites and payment systems as leverage points. Nation-state groups focus on espionage, using the proximity of diplomats and officials to quietly collect intelligence over long periods. Hacktivist groups, meanwhile, seek disruption and publicity.

Examples cited include Dark Scorpius, which has compromised more than 500 victims since 2022 by impersonating IT staff and gaining remote access in as little as 14 hours, and Fighting Ursa, a Russia-linked group known for phishing via spoofed sites and weaponised documents.

Read more on phishing and social engineering: LinkedIn Phishing Campaign Exploits Open-Source Pen Testing Tool to Compromise Business Execs 

Researchers outline several techniques likely to recur around Milano-Cortina:

  • Phishing and spoofed websites used to harvest credentials

  • Exploitation of software and API vulnerabilities in complex event systems

  • Use of previously compromised credentials bought on the dark web

  • DDoS attacks aimed at ticketing, turnstiles and event websites

For consumers and employees alike, basic caution still applies. “If it sounds too good to be true, it probably is,” Trey Ford, chief strategy and trust officer at Bugcrowd, said. “Buying from reputable sources […] is the only way to avoid credit card theft and counterfeit products.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleAWS CodeBuild Misconfiguration Exposed GitHub Repos to Potential Supply Chain Attacks
Next Article 2025’s most common passwords were as predictable as ever
Team-CWD
  • Website

Related Posts

News

Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries

February 6, 2026
News

New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

February 6, 2026
News

Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Look out for phony verification pages spreading malware

September 14, 2025

What is it, and how do I get it off my device?

September 11, 2025

2025’s most common passwords were as predictable as ever

January 21, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.