Expect A Cyber Attack On The FIFA World Cup In Russia

A survey of expert delegates attending the recent Infosecurity Europe 2018 show reveals that 72% of security professionals believe a cyberattack on this year’s FIFA World Cup in Russia is likely. 

This statistic reinforces the trend toward cyber attacks targeting high profile international events, such as the attack that took down the Winter Olympics website in February of this year.

“Cybercriminals do not exist in a vacuum,” said Andy Norton, director of threat intelligence at Lastline. “They will be aware of the immense media scrutiny the World Cup will be under, and will be hoping to capitalise on this as well as the financial opportunities such a unique event presents.”

Just over 70% of the info-security professionals who thought there would be an attack expect the attack vector to focus on network infrastructure, such as a DDoS attack, or on social media channels. An additional 44% thought email correspondence was at risk, and 47% said mobile threats could be a risk.

“While we do not know where the threat will come from, or what form it will take, it’s highly likely that cyber-criminals are devising plans for a cyberattack,” continued Norton. 

“The attack vectors used will vary depending on the threat actor and their individual motivations. An event like this, could see many different forms of attack from fake ticket spam to infiltration attempts into governing body infrastructure or even destructive payloads witnessed at the recent winter Olympics.”

While this news should undoubtedly come as a worry to infosec professionals, they clearly are not overly concerned as 83% believe that the FIFA World Cup does not pose a risk to their organisation. 

Also, it has not stopped some of them from getting in to the party spirit, with 30% suggesting they would wait until after a crucial match to fix an urgent corporate security issue, and almost 40% suggesting they would use a work device or working hours to watch a match, even if this was against corporate policy.

Last Line

You Might Also Read: 

Hackers Strike Winter Olympics:

Meet The Fancy Bears:


 

« EC-Council Sets New Application Security Training Standards
Facebook’s Head Of Policy Quits Amid Data Misuse Controversey »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Security Weekly

Security Weekly

Security Weekly provides free content within the subject areas of IT security news, vulnerabilities, hacking, and research.

Chatham House

Chatham House

Chatham House is an independent policy institute based in London. Topics cover foreign affairs and defence including cyber security.

Mitol PerfectBackup

Mitol PerfectBackup

Mitol PerfectBackup provide Enterprise Online Backup, Disaster Recovery and Cloud Computing Services.

Hodgson Russ

Hodgson Russ

Hodgson Russ is a US business law firm. Practice areas include Privacy, Data Breach & Cybersecurity.

ThreatHunter.ai

ThreatHunter.ai

ThreatHunter.ai (formerly Milton Security) is a business that tracks down and mitigates attacks in real time using our ARGOS Platform and our Elite Threat Hunters.

Westermo Network Technologies

Westermo Network Technologies

Westermo designs and manufactures robust, resilient and secure data communications products for mission-critical industrial systems.

Cyber Risk Opportunities

Cyber Risk Opportunities

Cyber Risk Opportunities was formed to enable middle-market executives to become more proficient cyber risk managers so their organizations can thrive.

Metro Systems

Metro Systems

Metro Systems offer fully integrated IT solutions & services covering Digital Transformation, Digital Infrastructure, Cyber Security and Training.

Sponge

Sponge

Cybersecurity Sorted by Sponge is a seriously engaging training game to make your staff the first line of defence against cyber threats.

DDOS-Guard

DDOS-Guard

DDoS-GUARD is one of the leading service providers on the global DDoS protection and content delivery markets.

TechForing Ltd.

TechForing Ltd.

TechForing Ltd. works for business organization's cyber security and cyber crime incident managements. We help business to secure their business online.

Militus

Militus

Militus provides the only information security service available that learns and analyzes your network over time using a custom-built network-based toolset.

oneclick

oneclick

oneclick is a central access and distribution platform in the cloud, enabling the management of the entire technology stack for application provisioning.

Acora

Acora

Acora provide a range of best-in-class managed services, Microsoft-centric business software, and cloud solutions designed to help mid-market organisations succeed in the digital economy.

KYND

KYND

KYND has created pioneering cyber risk technology that makes assessing, understanding, and managing business cyber risks easier and quicker than ever before.

Methods

Methods

Methods is the leading digital transformation partner for the UK public sector. We care deeply about making our public services better and have been doing this for over 28 years.