{"id":83466,"date":"2018-01-06T09:00:39","date_gmt":"2018-01-06T17:00:39","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=83466"},"modified":"2025-06-02T19:29:42","modified_gmt":"2025-06-03T02:29:42","slug":"malicious-document-targets-pyeongchang-olympics","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-document-targets-pyeongchang-olympics\/","title":{"rendered":"Malicious Document Targets Pyeongchang Olympics"},"content":{"rendered":"<p>McAfee Advanced Threat Research analysts have discovered a campaign targeting organizations involved with the Pyeongchang Olympics.<\/p>\n<p>Attached in an email was a malicious Microsoft Word document with the original file name \ub18d\uc2dd\ud488\ubd80, \ud3c9\ucc3d \ub3d9\uacc4\uc62c\ub9bc\ud53d \ub300\ube44 \ucd95\uc0b0\uc545\ucde8 \ubc29\uc9c0\ub300\ucc45 \uad00\ub828\uae30\uad00 \ud68c\uc758 \uac1c\ucd5c.doc (\u201cOrganized by Ministry of Agriculture and Forestry and Pyeongchang Winter Olympics\u201d).<\/p>\n<p>The primary target of the email was icehockey@pyeongchang2018.com, with several organizations in South Korea on the BCC line. The majority of these organizations had some association with the Olympics, either in providing infrastructure or in a supporting role. The attackers appear to be casting a wide net with this campaign.<\/p>\n<p>The campaign to target Pyeongchang Olympics began December 22, 2017 with the most recent activity appearing December 28. The attackers originally embedded an implant into the malicious document as a hypertext application (HTA) file, and then quickly moved to hide it in an image on a remote server and used obfuscated Visual Basic macros to launch the decoder script. They also wrote custom PowerShell code to decode the hidden image and reveal the implant.<\/p>\n<h2><strong>Analysis<\/strong><\/h2>\n<p>The malicious document was submitted from South Korea to Virus Total on December 29 at 09:04, a day after the original email was sent to the target list. The email was sent from the IP address 43.249.39.152, in Singapore, on December 28 at 23:34. The attacker spoofed the message to appear to be from info@nctc.go.kr, which is the National Counter-Terrorism Center (NCTC) in South Korea. The timing is interesting because the NCTC was in the process of conducting physical antiterror drills in the region in preparation for the Olympic Games. The spoofed source of this email suggests the message is legitimate and increases the chances that victims will treat it as such.<\/p>\n<p>Based on our analysis of the email header, this message did not come from NCTC, rather from the attacker\u2019s IP address in Singapore. The message was sent from a Postfix email server and originated from the hostname ospf1-apac-sg.stickyadstv.com. When the user opens the document, text in Korean tells the victim to enable content to allow the document to be opened in their version of Word.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180104-Olympics-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83472\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180104-Olympics-1.png\" alt=\"\" width=\"766\" height=\"711\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-1.png 766w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-1-300x278.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-1-539x500.png 539w\" sizes=\"auto, (max-width: 766px) 100vw, 766px\" \/><\/a><\/p>\n<p><em>The malicious document with instructions to enable content.<\/em><\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180104-Olympics-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83473\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180104-Olympics-2.png\" alt=\"\" width=\"644\" height=\"195\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-2.png 644w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-2-300x91.png 300w\" sizes=\"auto, (max-width: 644px) 100vw, 644px\" \/><\/a><\/p>\n<p><em>The enable content message.<\/em><\/p>\n<p>The document contains an obfuscated Visual Basic macro:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180104-Olympics-3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83474\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180104-Olympics-3.png\" alt=\"\" width=\"1407\" height=\"1152\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-3.png 1407w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-3-300x246.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-3-768x629.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-3-1024x838.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-3-611x500.png 611w\" sizes=\"auto, (max-width: 1407px) 100vw, 1407px\" \/><\/a><\/p>\n<p><em>Visual Basic macro.<\/em><\/p>\n<p>The malicious document launches a PowerShell script when the user clicks \u201cEnable Content.\u201d The document was created on December 27 at 15:52 by the author \u201cJohn.\u201d<\/p>\n<p>The malicious document launches the following PowerShell script:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180104-Olympics-4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83475\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180104-Olympics-4.png\" alt=\"\" width=\"983\" height=\"178\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-4.png 983w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-4-300x54.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-4-768x139.png 768w\" sizes=\"auto, (max-width: 983px) 100vw, 983px\" \/><\/a><\/p>\n<p><em>Manually executing the PowerShell script at the command line.<\/em><\/p>\n<p>The script downloads and reads an image file from a remote location and carves out a hidden PowerShell implant script embedded within the image file to execute.<\/p>\n<p>The attackers used the open-source tool Invoke-PSImage, released December 20, to embed the PowerShell script into the image file. The steganography tool works by embedding the bytes of a script into the pixels of the image file, giving the attacker the ability to hide malicious PowerShell code in a visible image on a remote server. The following script can be identified as generated by Invoke-PSImage to execute the attacker\u2019s implant in an image from a remote server.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180104-Olympics-5.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83476\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180104-Olympics-5.png\" alt=\"\" width=\"734\" height=\"246\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-5.png 734w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-5-300x101.png 300w\" sizes=\"auto, (max-width: 734px) 100vw, 734px\" \/><\/a><\/p>\n<p><em>The initial PowerShell script.<\/em><\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180104-Olympics-6.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83477\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180104-Olympics-6.png\" alt=\"\" width=\"684\" height=\"152\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-6.png 684w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-6-300x67.png 300w\" sizes=\"auto, (max-width: 684px) 100vw, 684px\" \/><\/a><\/p>\n<p><em>The image that contains the hidden PowerShell code.<\/em><\/p>\n<p>To verify the usage of steganography, we employed the tool StegExpose to check the file:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180104-Olympics-7.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83478\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180104-Olympics-7.png\" alt=\"\" width=\"1088\" height=\"38\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-7.png 1088w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-7-300x10.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-7-768x27.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-7-1024x36.png 1024w\" sizes=\"auto, (max-width: 1088px) 100vw, 1088px\" \/><\/a><\/p>\n<p>The result confirms the presence of hidden data in our file.<\/p>\n<p>Once the script runs, it passes the decoded script from the image file to the Windows command line in a variable $x, which uses cmd.exe to execute the obfuscated script and run it via PowerShell.<\/p>\n<p style=\"padding-left: 30px;\">&amp;&amp;set\u00a0 xmd=echo\u00a0 iex (ls env:tjdm).value ^| powershell -noni\u00a0 -noex\u00a0 -execut bypass -noprofile\u00a0 -wind\u00a0 hidden\u00a0\u00a0\u00a0\u00a0 &#8211; &amp;&amp; cmd\u00a0\u00a0 \/C%xmd%<\/p>\n<p>The extracted script is heavily disguised, using a combination of string-format operator obfuscation and other string-based obfuscation techniques.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180104-Olympics-8.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83479\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180104-Olympics-8.png\" alt=\"\" width=\"935\" height=\"275\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-8.png 935w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-8-300x88.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-8-768x226.png 768w\" sizes=\"auto, (max-width: 935px) 100vw, 935px\" \/><\/a><\/p>\n<p><em>The obfuscated PowerShell implant script.<\/em><\/p>\n<p>The attacker\u2019s objective is to make analysis difficult and to evade detection technologies that rely on pattern matching. Because the obfuscation makes use of native functions in PowerShell, the script can run in an obfuscated state and work correctly.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180104-Olympics-9.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83480\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180104-Olympics-9.png\" alt=\"\" width=\"969\" height=\"69\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-9.png 969w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-9-300x21.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-9-768x55.png 768w\" sizes=\"auto, (max-width: 969px) 100vw, 969px\" \/><\/a><\/p>\n<p><em>Obfuscated control servers.<\/em><\/p>\n<p>When we deobfuscate the control server URLs, the implant establishes a connection to the following site over SSL:<\/p>\n<p style=\"padding-left: 30px;\">hxxps:\/\/www.thlsystems.forfirst.cz:443\/components\/com_tags\/views\/login\/process.php.<\/p>\n<p>Based on our analysis, this implant establishes an encrypted channel to the attacker\u2019s server, likely giving the attacker the ability to execute commands on the victim\u2019s machine and to install additional malware. Ultimately this PowerShell implant will be set to automatically start daily at 2 am via a scheduled task (shown below). The view.hta contains the same PowerShell-based implant and establishes a remote connection over SSL to hxxps:\/\/200.122.181.63:443\/components\/com_tags\/views\/news.php.<\/p>\n<p style=\"padding-left: 30px;\">C:\\Windows\\system32\\schtasks.exe&#8221; \/Create \/F \/SC DAILY \/ST 14:00 \/TN &#8220;MS Remoute Update&#8221; \/TR C:\\Users\\Ops03\\AppData\\Local\\view.hta<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180104-Olympics-10.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83481\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180104-Olympics-10.png\" alt=\"\" width=\"1097\" height=\"124\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-10.png 1097w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-10-300x34.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-10-768x87.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-10-1024x116.png 1024w\" sizes=\"auto, (max-width: 1097px) 100vw, 1097px\" \/><\/a><\/p>\n<p><em>The contents of view.hta.<\/em><\/p>\n<p>During our research, we discovered a cached Apache server log for the IP address 81.31.47.101, which is shared hosting. This log contained information for the control server thlsystems.forfirst.cz, which showed an IP address from South Korea connecting to the specific URL paths contained in the PowerShell implants. This indicates that the implant was active in South Korea and targets were likely being infected.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180104-Olympics-11.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83482\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180104-Olympics-11.png\" alt=\"\" width=\"1213\" height=\"233\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-11.png 1213w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-11-300x58.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-11-768x148.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-11-1024x197.png 1024w\" sizes=\"auto, (max-width: 1213px) 100vw, 1213px\" \/><\/a><\/p>\n<p><em>Apache server log from December 29, 2017.<\/em><\/p>\n<p>While investigating thlsystems.forfirst.cz we discovered that the webpage belongs to a legitimate entity, suggesting this is a compromised server being used as both an encrypted backchannel for the attacker and the distribution of implants. The server also hosts a copy of the obfuscated PowerShell implant.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180104-Olympics-12.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83483\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180104-Olympics-12.png\" alt=\"\" width=\"1039\" height=\"323\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-12.png 1039w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-12-300x93.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-12-768x239.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-12-1024x318.png 1024w\" sizes=\"auto, (max-width: 1039px) 100vw, 1039px\" \/><\/a><\/p>\n<p>The implant establishes an encrypted channel to the following URL path:<\/p>\n<p style=\"padding-left: 30px;\">hxxps:\/\/www.thlsystems.forfirst.cz:443\/components\/com_tags\/views\/admin\/get.php<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180104-Olympics-13.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83484\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180104-Olympics-13.jpg\" alt=\"\" width=\"765\" height=\"203\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-13.jpg 765w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-13-300x80.jpg 300w\" sizes=\"auto, (max-width: 765px) 100vw, 765px\" \/><\/a><\/p>\n<p><em>An image from December 30, 2017.<\/em><\/p>\n<p>When investigating the IP address from the PowerShell implant 200.122.181.63 we found a server in Costa Rica that resolves to mafra.go.kr.jeojang.ga. The domain jeojang.ga was registered via Freenom, a free anonymous domain provider. It appears the attacker is using parts of a domain that belong to the South Korean Ministry of Agriculture and Forestry, which is in line with the attached document name in the email, but this domain has nothing to do with this government agency.<\/p>\n<p>A version of the malicious document from December 22 embedded the PowerShell implant directly into the Word document in the form of an HTA file. McAfee Advanced Threat Research analysts discovered another document that was hosted at this domain; its original title is \uc704\ud5d8 \uacbd\ubcf4 (\uc804\uad6d\uc57c\uc0dd\uc870\ub958 \ubd84\ubcc0 \uace0\ubcd1\uc6d0\uc131 AI(H5N6\ud615) \uac80\ucd9c).docx, which also appears to come from the Ministry of Agriculture and Forestry. This document was created on December 22 by the same author, \u201cJohn.\u201d The document does not contain macros, rather OLE streams for the embedded HTA files. When the Korean-language docx icon is clicked, it launches the embedded HTA file Error733.hta. This file contains the same script code to launch the PowerShell implant as in the view.hta example.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180104-Olympics-14.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83485\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180104-Olympics-14.png\" alt=\"\" width=\"1299\" height=\"838\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-14.png 1299w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-14-300x194.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-14-768x495.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-14-1024x661.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-14-775x500.png 775w\" sizes=\"auto, (max-width: 1299px) 100vw, 1299px\" \/><\/a><\/p>\n<p><em>An earlier malicious document that relies on OLE streams.<\/em><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h3><strong>Conclusion<\/strong><\/h3>\n<p>The basic method in this case, an in-memory implant using PowerShell along with obfuscation to avoid detection, is a common and increasing popular fileless technique used in cyberattacks. We have not previously seen this kind of attack targeting victims in South Korea.<\/p>\n<p>The use of the steganography tool shows how quickly the adversary has adapted to new tools. On December 20, the tool Invoke-PSImage was released to the public and within seven days was tested and deployed in a campaign targeting organizations involved in the 2018 Pyeongchang Olympics.<\/p>\n<p>With the upcoming Olympics, we expect to see an increase in cyberattacks using Olympics-related themes. In similar past cases, the victims were targeted for their passwords and financial information. In this case the adversary is targeting the organizations involved in the Winter Olympics by using several techniques to make it more tempting to open the weaponized document:<\/p>\n<ul>\n<li>Spoofed email address from South Korea\u2019s National Counter-Terrorism Council<\/li>\n<li>Use of Korean language<\/li>\n<li>Asking users to open the content because the document is in protected mode<\/li>\n<li>Partial use of the original South Korean Ministry of Agriculture and Forestry domain in a registered fake domain for malicious intent<\/li>\n<\/ul>\n<p>The Advanced Threat Research team has discovered an increase in the use of weaponized Word documents against South Korean targets in place of the traditional use of weaponized documents exploiting vulnerabilities in the Hangul word processor software.<\/p>\n<h2><strong>Indicators of compromise<\/strong><\/h2>\n<p><span style=\"text-decoration: underline;\"><strong>SHA-1 <\/strong><\/span><\/p>\n<ul>\n<li>c388b693d10e2b84af52ab2c29eb9328e47c3c16<\/li>\n<li>8ad0a56e3db1e2cd730031bdcae2dbba3f7aba9c<\/li>\n<\/ul>\n<p><span style=\"text-decoration: underline;\"><strong>IPs<\/strong><\/span><\/p>\n<ul>\n<li>200.122.181.63<\/li>\n<\/ul>\n<p><span style=\"text-decoration: underline;\"><strong>Domains<\/strong><\/span><\/p>\n<ul>\n<li>thlsystems.forfirst.cz<\/li>\n<li>mafra.go.kr.jeojang.ga<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>McAfee Advanced Threat Research analysts have discovered a campaign targeting organizations involved with the Pyeongchang Olympics. Attached in an email&#8230;<\/p>\n","protected":false},"author":911,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[4452,338,180],"coauthors":[2544,5349],"class_list":["post-83466","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-cybersecurity","tag-endpoint-protection","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Malicious Document Targets Pyeongchang Olympics | McAfee Blog<\/title>\n<meta name=\"description\" content=\"McAfee Advanced Threat Research analysts have discovered a campaign targeting organizations involved with the Pyeongchang Olympics. Attached in an email\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Malicious Document Targets Pyeongchang Olympics | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"McAfee Advanced Threat Research analysts have discovered a campaign targeting organizations involved with the Pyeongchang Olympics. Attached in an email\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-document-targets-pyeongchang-olympics\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-06T17:00:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-03T02:29:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"766\" \/>\n\t<meta property=\"og:image:height\" content=\"711\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Ryan Sherstobitoff, Jessica Saavedra-Morales\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@r_sherstobitoff\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ryan Sherstobitoff, Jessica Saavedra-Morales\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-document-targets-pyeongchang-olympics\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-document-targets-pyeongchang-olympics\/\"},\"author\":{\"name\":\"Ryan Sherstobitoff\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8f80835dde8294e9c91e4cd0f998e035\"},\"headline\":\"Malicious Document Targets Pyeongchang Olympics\",\"datePublished\":\"2018-01-06T17:00:39+00:00\",\"dateModified\":\"2025-06-03T02:29:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-document-targets-pyeongchang-olympics\/\"},\"wordCount\":1431,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-document-targets-pyeongchang-olympics\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180104-Olympics-1.png\",\"keywords\":[\"cybersecurity\",\"endpoint protection\",\"malware\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-document-targets-pyeongchang-olympics\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-document-targets-pyeongchang-olympics\/\",\"name\":\"Malicious Document Targets Pyeongchang Olympics | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-document-targets-pyeongchang-olympics\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-document-targets-pyeongchang-olympics\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180104-Olympics-1.png\",\"datePublished\":\"2018-01-06T17:00:39+00:00\",\"dateModified\":\"2025-06-03T02:29:42+00:00\",\"description\":\"McAfee Advanced Threat Research analysts have discovered a campaign targeting organizations involved with the Pyeongchang Olympics. Attached in an email\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-document-targets-pyeongchang-olympics\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-document-targets-pyeongchang-olympics\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-document-targets-pyeongchang-olympics\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180104-Olympics-1.png\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180104-Olympics-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-document-targets-pyeongchang-olympics\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Malicious Document Targets Pyeongchang Olympics\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8f80835dde8294e9c91e4cd0f998e035\",\"name\":\"Ryan Sherstobitoff\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/b9bc99b6021883cbf5794b450795dc55\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/Ryan-150x150.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/Ryan-150x150.jpg\",\"caption\":\"Ryan Sherstobitoff\"},\"description\":\"Ryan Sherstobitoff is a Senior Analyst for Major Campaigns \u2013 Advanced Threat Research in McAfee. Ryan specializes in threat intelligence in the Asia Pacific Region where he conducts cutting edge research into new adversarial techniques and adapts those to better monitor the threat landscape. He formerly was the Chief Corporate Evangelist at Panda Security, where he managed the US strategic response for new and emerging threats. Ryan is widely recognized as a security &amp; cloud computing expert throughout the country.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/ryan-sherstobitoff-a1334a5\/\",\"https:\/\/x.com\/r_sherstobitoff\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/ryan-sherstobitoff\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Malicious Document Targets Pyeongchang Olympics | McAfee Blog","description":"McAfee Advanced Threat Research analysts have discovered a campaign targeting organizations involved with the Pyeongchang Olympics. Attached in an email","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Malicious Document Targets Pyeongchang Olympics | McAfee Blog","og_description":"McAfee Advanced Threat Research analysts have discovered a campaign targeting organizations involved with the Pyeongchang Olympics. Attached in an email","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-document-targets-pyeongchang-olympics\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2018-01-06T17:00:39+00:00","article_modified_time":"2025-06-03T02:29:42+00:00","og_image":[{"width":766,"height":711,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/01\/20180104-Olympics-1.png","type":"image\/png"}],"author":"Ryan Sherstobitoff, Jessica Saavedra-Morales","twitter_card":"summary_large_image","twitter_creator":"@r_sherstobitoff","twitter_site":"@McAfee","twitter_misc":{"Written by":"Ryan Sherstobitoff, Jessica Saavedra-Morales","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-document-targets-pyeongchang-olympics\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-document-targets-pyeongchang-olympics\/"},"author":{"name":"Ryan Sherstobitoff","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8f80835dde8294e9c91e4cd0f998e035"},"headline":"Malicious Document Targets Pyeongchang Olympics","datePublished":"2018-01-06T17:00:39+00:00","dateModified":"2025-06-03T02:29:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-document-targets-pyeongchang-olympics\/"},"wordCount":1431,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-document-targets-pyeongchang-olympics\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180104-Olympics-1.png","keywords":["cybersecurity","endpoint protection","malware"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-document-targets-pyeongchang-olympics\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-document-targets-pyeongchang-olympics\/","name":"Malicious Document Targets Pyeongchang Olympics | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-document-targets-pyeongchang-olympics\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-document-targets-pyeongchang-olympics\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180104-Olympics-1.png","datePublished":"2018-01-06T17:00:39+00:00","dateModified":"2025-06-03T02:29:42+00:00","description":"McAfee Advanced Threat Research analysts have discovered a campaign targeting organizations involved with the Pyeongchang Olympics. Attached in an email","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-document-targets-pyeongchang-olympics\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-document-targets-pyeongchang-olympics\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-document-targets-pyeongchang-olympics\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180104-Olympics-1.png","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/01\/20180104-Olympics-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malicious-document-targets-pyeongchang-olympics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Malicious Document Targets Pyeongchang Olympics"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8f80835dde8294e9c91e4cd0f998e035","name":"Ryan Sherstobitoff","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/b9bc99b6021883cbf5794b450795dc55","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/Ryan-150x150.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/Ryan-150x150.jpg","caption":"Ryan Sherstobitoff"},"description":"Ryan Sherstobitoff is a Senior Analyst for Major Campaigns \u2013 Advanced Threat Research in McAfee. Ryan specializes in threat intelligence in the Asia Pacific Region where he conducts cutting edge research into new adversarial techniques and adapts those to better monitor the threat landscape. He formerly was the Chief Corporate Evangelist at Panda Security, where he managed the US strategic response for new and emerging threats. Ryan is widely recognized as a security &amp; cloud computing expert throughout the country.","sameAs":["https:\/\/www.linkedin.com\/in\/ryan-sherstobitoff-a1334a5\/","https:\/\/x.com\/r_sherstobitoff"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/ryan-sherstobitoff\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/83466","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/911"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=83466"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/83466\/revisions"}],"predecessor-version":[{"id":214932,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/83466\/revisions\/214932"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=83466"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=83466"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=83466"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=83466"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}