Top stories.
- Pro-Russia hacktivists target the Winter Olympics.
- US National Cyber Director calls for deeper collaboration at the Munich Cyber Security Conference.
- Fake video meeting invites deliver signed RMM tools.
Pro-Russia hacktivists target the Winter Olympics.
Intel 471 has observed a surge in pro-Russia hacktivism since the opening of the Winter Olympics on February 6th. Russia was banned from competing in the games due to the ongoing war in Ukraine, and cyber retaliation was not unexpected: the country previously launched cyberattacks against the 2018 Winter Olympics after its athletes were banned for doping.
Intel 471 says the hacktivist group NoName057(16) launched DDoS attacks against Italian entities located in the Olympics’ host cities of Milan and Cortina. The group also claimed to have targeted "the Lithuanian, Polish and Spanish national Olympic committees, as well as a Cortina d’Ampezzo tourism website and Milan Malpensa Airport." Additionally, the BD Anonymous group allegedly targeted the websites of two Italian airports, while the Z-Pentest Alliance and Server Killers groups claimed to have targeted Italian critical infrastructure. Italian authorities acknowledged the incidents, but said the attacks were thwarted without any notable impacts.
While the cyberattacks against the 2018 Olympics were tied to Russian government threat actors, the 2026 attacks are attributed to low-level hacktivist groups. Intel 471 notes, "We cannot completely dismiss the possibility that Russian state-backed threat groups have conducted persistence attacks against entities involved in the 2026 Winter Olympics. However, this type of influence and the suggested need to defend Russia’s image on the world stage likely are secondary or tertiary intelligence objectives for the Kremlin at present."

