Expect A Cyber Attack On The FIFA World Cup In Russia

A survey of expert delegates attending the recent Infosecurity Europe 2018 show reveals that 72% of security professionals believe a cyberattack on this year’s FIFA World Cup in Russia is likely. 

This statistic reinforces the trend toward cyber attacks targeting high profile international events, such as the attack that took down the Winter Olympics website in February of this year.

“Cybercriminals do not exist in a vacuum,” said Andy Norton, director of threat intelligence at Lastline. “They will be aware of the immense media scrutiny the World Cup will be under, and will be hoping to capitalise on this as well as the financial opportunities such a unique event presents.”

Just over 70% of the info-security professionals who thought there would be an attack expect the attack vector to focus on network infrastructure, such as a DDoS attack, or on social media channels. An additional 44% thought email correspondence was at risk, and 47% said mobile threats could be a risk.

“While we do not know where the threat will come from, or what form it will take, it’s highly likely that cyber-criminals are devising plans for a cyberattack,” continued Norton. 

“The attack vectors used will vary depending on the threat actor and their individual motivations. An event like this, could see many different forms of attack from fake ticket spam to infiltration attempts into governing body infrastructure or even destructive payloads witnessed at the recent winter Olympics.”

While this news should undoubtedly come as a worry to infosec professionals, they clearly are not overly concerned as 83% believe that the FIFA World Cup does not pose a risk to their organisation. 

Also, it has not stopped some of them from getting in to the party spirit, with 30% suggesting they would wait until after a crucial match to fix an urgent corporate security issue, and almost 40% suggesting they would use a work device or working hours to watch a match, even if this was against corporate policy.

Last Line

You Might Also Read: 

Hackers Strike Winter Olympics:

Meet The Fancy Bears:


 

« EC-Council Sets New Application Security Training Standards
Facebook’s Head Of Policy Quits Amid Data Misuse Controversey »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

SCADAhacker

SCADAhacker

SCADAhacker provides mission critical information relating to industrial security of SCADA, DCS and other Industrial Control Systems.

iboss Network Security

iboss Network Security

The iboss cloud is designed to deliver Network Security as a Service, in the cloud, using the best malware engines, threat feeds and log analytics engines.

TorGuard

TorGuard

TorGuard is a Virtual Private Network services provider offering secure encrypted access to the internet.

National Authority for Electronic Certification and Cyber Security (AKCESK) - Albania

National Authority for Electronic Certification and Cyber Security (AKCESK) - Albania

AKCESK ensures security for trusted services, in particular reliability and security in electronic transactions between citizens, businesses and public authorities.

HKCERT

HKCERT

HKCERT is the centre for coordination of computer security incident response for local enterprises and Internet Users in Hong Kong.

DeuZert

DeuZert

DeuZert is an accredited German certification body in accordance with ISO/IEC 27001 (Information Security Management).

Computer Network Defence (CND)

Computer Network Defence (CND)

Computer Network Defence (CND) are a Broad-Spectrum Cyber Security Consultancy and Recruitment Agency.

HOBI International

HOBI International

HOBI International is a leading mobile, IT and data center asset management provider with solutions for device management, reverse logistics, data erasure, refurbishment and recycling.

MassMutual Ventures

MassMutual Ventures

Mass Mutual ventures backs companies building category-defining businesses in markets including enterprise software, digital health, cybersecurity, and fintech.

7layers

7layers

7layers has established itself as one of the world’s leading test house groups for mobile devices and the growing number of wireless devices, modules and chipsets.

Visory

Visory

Great businesses depend on great technology. We make sure our clients go to market with enterprise-level technology and world-class security for their data and infrastructure.

AnyTech365

AnyTech365

AnyTech365 is a leading European IT Security and Support company helping end users and small businesses have a worry-free experience with all things tech.

FortiGuard Labs

FortiGuard Labs

FortiGuard Labs is the threat intelligence and research organization at Fortinet. Its mission is to provide Fortinet customers with the industry’s best threat intelligence.

Beyon Cyber

Beyon Cyber

Beyon Cyber offer a complete portfolio of advanced solutions & services for cyber security in Bahrain.

Acumen

Acumen

Acumen's cyber security engineers protect your critical systems, in critical moments. We are here when you need us most.

Secomea

Secomea

Secomea redefines manufacturing plant security by combining internationally recognized industry best practices as critical components of our robust cybersecurity strategy.