Participants in the opening ceremony for the Pyeongchang Olympics on Feb. 9, 2018. Photo: Kyodo News via Getty Images

The newly discovered malware known as "Olympic Destroyer" was specifically designed to attack the Olympics, researchers have found, although the first batch of investigations haven't been able to pin point the source.

How it works: Like the name suggests, Destroyer is purely destructive. Unlike ransomware, it does not extort money, and the malware doesn't steal files. Instead, it deletes backup files on a system and tampers with files needed to boot a computer, making it impossible to boot without repair. It does not delete the main files or programs on a computer.

Why that matters: Researchers at Cisco's Talos division speculate that, without a backup, tech support would won't restore the hard drive to a state where the malware is totally wiped. The attacker can then relaunch the same attack over and over again.

  • The malware uses hard-coded network credentials for Olympic systems and any credentials it comes across, allowing it to attack other computers on the same network.
  • Changing the hard-coded credentials could then set loose another attack.
  • The attackers would have had to steal credentials before programming it into the malware.

Who's behind it: Adam Meyers, Vice President of Intelligence at Crowdstrike, notes that Fancy Bear, one of the believed Russian groups thought to be behind the Democratic National Committee breach, hacked a number of Olympic-affiliated systems in November and December. The malware was compiled in late December. That might hint at Russian involvement.

  • Possible motive: Russia feels that being all but barred from the Olympics for widespread doping is a slight against the nation. In the 2016 Olympics, when Russian athletes were banned in bulk, a lead Fancy Bear is believed to have hacked the World Anti Doping Agency.
  • Yes, but: The timeline of attacks doesn't necessarily attribute it to Russia, Meyers said.
  • Maybe China? The firm Intezer found that Olympic Destroyer shared "significant" chunks of computer code with believed Chinese-affiliated espionage groups. That does not mean China is behind the attack so much as someone using Chinese computer code is behind the attack. But Intezer, which operates a code analysis system similar to automated plagiarism detection websites, has not found any other code that matches.

Go deeper

Updated 27 mins ago - Politics & Policy

Coronavirus dashboard

Illustration: Sarah Grillo/Axios

  1. Politics: Ex-FDA chief: Pence campaigning after COVID exposure puts others at risk — Mark Meadows: "We are not going to control the pandemic"— COVID-19 looms over White House Halloween celebrations.
  2. Health: 13 states set single-day coronavirus case records last week — Fauci says maybe we should mandate masks if people don't wear themU.S. reports over 80,000 new cases for second consecutive day.
  3. World: Italy tightens restrictions Spain declares new state of emergency.

Amy Coney Barrett's immediate impact

Illustration: Eniola Odetunde/Axios

In her first week on the job, Amy Coney Barrett may be deciding which votes to count in the presidential election. By her third week, she’ll be deciding the fate of the Affordable Care Act.

Where it stands: The Senate votes on Barrett’s nomination tomorrow. If she’s confirmed, Chief Justice John Roberts is expected to swear her in at the Supreme Court within hours, an administration official tells Axios.

Texas Democrats beg Biden to spend now

Photo: Ron Jenkins/Getty Images

The Biden campaign is rebuffing persistent pleas from Texas Democrats to spend at least $10 million in the Lone Star state, several people familiar with the talks tell Axios.

Why it matters: If Texas — which has 38 electoral votes and is steadily getting more blue, but hasn't backed a Democrat for president since 1976 — flipped to the Biden column, it would be game over. But the RealClearPolitics polling average stubbornly hovers at +2.6 for Trump — and Team Biden appears more focused on closer targets.