ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Home > List all groups > Operation Olympic Games

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link APT group: Operation Olympic Games

NamesOperation Olympic Games (self given)
CountryUSA USA
Israel Israel
SponsorState-sponsored, Equation Group (NSA), CIA and Unit 8200
MotivationInformation theft and espionage, Sabotage and destruction
First seen2007
DescriptionThe events have been described in detail in the 2015 book Countdown to Zero Day and the 2016 documentary Zero Days. The piece of crucial information that was missing from both sources, how the malware was actually brought inside the facility, was documented in an investigative report in 2019.

(The New York Times) From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.

Mr. Obama decided to accelerate the attacks — begun in the Bush administration and code-named Olympic Games — even after an element of the program accidentally became public in the summer of 2010 because of a programming error that allowed it to escape Iran’s Natanz plant and sent it around the world on the Internet. Computer security experts who began studying the worm, which had been developed by the United States and Israel, gave it a name: Stuxnet.
ObservedSectors: Energy.
Countries: Iran.
Tools usedStuxnet.

Last change to this card: 17 January 2024

Download this actor card in PDF or JSON format

Previous: Operation NightScout
Next: Operation Parliament

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]