This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

BT: London 2012 cyber attacks did not materialise

Share this article:
Transport for London expects the capital to be Lost Device Central this summer
Transport for London expects the capital to be Lost Device Central this summer

The biggest threats to the London Olympics were script kiddies and infected laptops connecting to the corporate network, according to BT.

Speaking to the Register, BT's global head of secure customer advocacy, Phil Packman, said that the games were notable for the absence of a major cyber attack after warnings from officials at previous hosts Beijing and Vancouver said that they would ‘be run ragged'.

He said: “We geared up for complex attacks from various actors and the reality is they were unsophisticated and perpetrated by children.

“We were geared up specifically to look at something sinister and the reality was much more amateurish. But this brought its own challenges – the attacks were a lot more sporadic and less obvious. On day two or three they attacked the wrong company because they got the URL of a sponsor wrong.”

One distributed denial-of-service (DDoS) attack by a hacktivist on the first day of the games, in retaliation for the displacement of Occupy protesters from Stratford, was attempted but BT's four 10GB pipes and Akamai's content distribution service meant taking down the infrastructure proved too difficult.

“Within one hour of the Anonymous attack the feedback was ‘we're not getting anywhere, let's attack the sponsors',” Packman explained.

Packman also said that the only other major security challenge was the arrival of 25,000 journalists, all of whom required unfettered access to the network on their own devices, with some writers less than enthused by BT's attempts to locate and clean up any infected machines.

While Packman said that attack traffic averaged less than one per cent of total volumes, with most of that figure accounted for by 'background noise' rather than anything specifically targeted at the games, the real story will be told by Atos, who dealt with IT security at London 2012.

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

Hundreds of companies face 2,000 cyber-attacks in EU exercise

Hundreds of companies face 2,000 cyber-attacks in EU ...

The European Network and Information Security Agency (ENISA) conducted a 24-hour cyber-exercise in which more than 200 organisations from 25 EU member states faced virtual cyber-attacks from white hat hackers ...

Cyber security still a learning curve for most companies

Cyber security still a learning curve for most ...

Poor network visibility, outdated security tools, a skills shortage and a lack of control in the cloud are just some of the reasons companies are struggling with cyber-security, say two ...

WorldPay hacker sentenced to 11 years for role in £6 million scheme

WorldPay hacker sentenced to 11 years for role ...

An Estonian man, who helped hack payment processor RBS WorldPay in 2008, has now been sentenced to 11 years in prison for his involvement in the £5.9 (US$ 9.4 million) ...