Operation Olympic Games - Threat Group Cards: A Threat Actor Encyclopedia Archived: 2026-04-06 00:55:53 UTC Home > List all groups > Operation Olympic Games APT group: Operation Olympic Games Names Operation Olympic Games (self given) GOSSIPGIRL (?) Country USA Israel Sponsor State-sponsored, Equation Group (NSA), CIA and Unit 8200 Motivation Information theft and espionage, Sabotage and destruction First seen 2007 Description The events have been described in detail in the 2015 book Countdown to Zero Day and the 2016 documentary Zero Days. The piece of crucial information that was missing from both sources, how the malware was actually brought inside the facility, was documented in an investigative report in 2019. (The New York Times) From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program. Mr. Obama decided to accelerate the attacks — begun in the Bush administration and code-named Olympic Games — even after an element of the program accidentally became public in the summer of 2010 because of a programming error that allowed it to escape Iran’s Natanz plant and sent it around the world on the Internet. Computer security experts who began studying the worm, which had been developed by the United States and Israel, gave it a name: Stuxnet. Observed Sectors: Energy. Countries: Iran. Tools used Stuxnet. https://apt.etda.or.th/cgi-bin/showcard.cgi?u=40c47a97-22a5-46d3-978e-f89c802dad93 Page 1 of 2 Information Last change to this card: 17 January 2024 Download this actor card in PDF or JSON format Source: https://apt.etda.or.th/cgi-bin/showcard.cgi?u=40c47a97-22a5-46d3-978e-f89c802dad93 https://apt.etda.or.th/cgi-bin/showcard.cgi?u=40c47a97-22a5-46d3-978e-f89c802dad93 Page 2 of 2