Tokyo 2020 Olympics suffered half a billion attempted cyberattacks

100m sprint semi-final at the 2020 Tokyo Olympic Games
(Image credit: ANTONIN THUILLIER/AFP via Getty Images)

Whilst the Olympic Games were taking place in Tokyo earlier this year, another, huge competition was also taking place behind the curtain - between the organization’s 200-people strong cybersecurity team, and countless hackers, criminal groups and other malicious actors.

The good guys won, as none of the attacks were successful and Tokyo 2020 continued without a hiccup. However, it’s safe to say that the criminals made the security experts work hard for their money.

The NTT Corporation, which provided its services for the Olympic & Paralympic Games in Tokyo, revealed there were more than 450 million attempted cyberattacks during the event - 2.5 times more than the amount recorded during London 2012.

Abusing novel 5G

Among the 450 million attacks, NTT said Emotet malware, email spoofing, phishing, as well as fake websites, were among the most popular methods. The company also expected Distributed Denial of Service (DDoS) attacks, ransomware, as well as attacks against critical infrastructure.

Among this infrastructure was 5G, as all games venues were turned to 5G mobile networks after commercial services started in Japan earlier in 2020. During the events, there had been unauthorized communications targeting vulnerabilities in terminals. NTT managed to mitigate the attack by blocking the communications.

NTT believes it was successful in holding the perimeter thanks to four key factors: Threat intelligence and monitoring; total security solutions (it adopted a whitelist format), quality employee training and awareness programs; and stakeholder management (tight collaboration with ICT providers, critical infrastructure, the International Olympic Committee, as well as the Tokyo 2020 Organizing Committee).

"Cybercriminals certainly saw the Games -- and its related supply chain -- as a high-value target with low downtime tolerance,” commented NTT's Andrea MacLean. “After all, crime follows opportunity. And with connected stadiums, fan engagement platforms and complete digital replicas of sporting venues and the events themselves becoming the norm, there's plenty of IT infrastructure and data to target -- and via a multitude of components.” 

Looking to stay secure? You might also want to check out our list of the best firewall services out there

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
An illustration of a silhouetted thief in motion running while carrying a stolen fingerprint
The 5 worst cyberattacks of 2024
An image of network security icons for a network encircling a digital blue earth.
Why effective cybersecurity is a team effort
Flags of Iran, China, Russia and North Korea on a wall. China North Korea Iran Russia alliance
Cybercrime is helping fund rogue nations across the world - and it's only going to get worse, Google warns
An image of network security icons for a network encircling a digital blue earth.
Standing strong against hyper-volumetric DDoS attacks
Illustration of a thief escaping with a white fingerprint
5 massive privacy scandals that rocked the world – and made millions of victims
Hack The Box crisis simulation event
“Everyone will experience a hack” - how incident response can protect your organization
Latest in Security
Microsoft
"Another pair of eyes" - Microsoft launches all-new Security Copilot Agents to give security teams the upper hand
Lock on Laptop Screen
Medusa ransomware is able to disable anti-malware tools, so be on your guard
An abstract image of digital security.
Fake file converters are stealing info, pushing ransomware, FBI warns
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Coinbase targeted after recent Github attacks
hacker.jpeg
Key trusted Microsoft platform exploited to enable malware, experts warn
IBM office logo
IBM to provide platform for flagship cyber skills programme for girls
Latest in News
Disney Plus logo with popcorn
You can finally tell Disney+ to stop bugging you about that terrible Marvel show you regret starting
Girl wearing Meta Quest 3 headset interacting with a jungle playset
Latest Meta Quest 3 software beta teases a major design overhaul and VR screen sharing – and I need these updates now
Philips Hue
Philips Hue might be working on a video doorbell, and according to a new report, we just got our first look at it
Microsoft
"Another pair of eyes" - Microsoft launches all-new Security Copilot Agents to give security teams the upper hand
The Samsung Galaxy S25 Edge on display the January 22, 2025 Galaxy Unpacked event.
A fresh Samsung Galaxy S25 Edge leak hints at a 2K display and a titanium frame
Hatch Restore 3 in Putty
You can finally start your day with The Office theme song, and I couldn't be more excited