Expect A Cyber Attack On The FIFA World Cup In Russia

A survey of expert delegates attending the recent Infosecurity Europe 2018 show reveals that 72% of security professionals believe a cyberattack on this year’s FIFA World Cup in Russia is likely. 

This statistic reinforces the trend toward cyber attacks targeting high profile international events, such as the attack that took down the Winter Olympics website in February of this year.

“Cybercriminals do not exist in a vacuum,” said Andy Norton, director of threat intelligence at Lastline. “They will be aware of the immense media scrutiny the World Cup will be under, and will be hoping to capitalise on this as well as the financial opportunities such a unique event presents.”

Just over 70% of the info-security professionals who thought there would be an attack expect the attack vector to focus on network infrastructure, such as a DDoS attack, or on social media channels. An additional 44% thought email correspondence was at risk, and 47% said mobile threats could be a risk.

“While we do not know where the threat will come from, or what form it will take, it’s highly likely that cyber-criminals are devising plans for a cyberattack,” continued Norton. 

“The attack vectors used will vary depending on the threat actor and their individual motivations. An event like this, could see many different forms of attack from fake ticket spam to infiltration attempts into governing body infrastructure or even destructive payloads witnessed at the recent winter Olympics.”

While this news should undoubtedly come as a worry to infosec professionals, they clearly are not overly concerned as 83% believe that the FIFA World Cup does not pose a risk to their organisation. 

Also, it has not stopped some of them from getting in to the party spirit, with 30% suggesting they would wait until after a crucial match to fix an urgent corporate security issue, and almost 40% suggesting they would use a work device or working hours to watch a match, even if this was against corporate policy.

Last Line

You Might Also Read: 

Hackers Strike Winter Olympics:

Meet The Fancy Bears:


 

« EC-Council Sets New Application Security Training Standards
Facebook’s Head Of Policy Quits Amid Data Misuse Controversey »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Secunet Security Networks

Secunet Security Networks

Secunet is a leading cyber security company offering a combination of consultancy and products, delivering the highest level of security for data, applications and digital identities.

Recorded Future

Recorded Future

Recorded Future arms security teams with threat intelligence powered by patented machine learning to lower risk.

Invensis Learning

Invensis Learning

Invensis Learning is a professional training and certification company providing IT Service Management, IT Security & Governance, DevOps, Cloud Computing and Digital Awareness training.

Cybersecurity Association of Maryland (CAMI)

Cybersecurity Association of Maryland (CAMI)

CAMI’s mission is to create a global cybersecurity marketplace in Maryland and generate thousands of high-pay jobs through the cybersecurity industry.

The Legal 500

The Legal 500

The Legal 500 Hall of Fame highlights, to clients, the law firm partners who are at the pinnacle of the profession. Practice areas covered include Data Protection, Privacy and Cybersecurity.

A3Sec

A3Sec

A3Sec provides professional solutions in the areas of Cybersecurity, Device Monitoring, Business Intelligence and Big Data.

SWAT Systems

SWAT Systems

SWAT Systems is an IT support and cyber security managed service provider.

EvoNexus

EvoNexus

EvoNexus is a technology startup incubator with locations in San Diego, Orange County, and Silicon Valley.

German Israeli Partnership Accelerator (GIPA)

German Israeli Partnership Accelerator (GIPA)

GIPA is based on two pillars: it is an incubator aimed at young academics and a program to transfer cybersecurity expertise to corporate partners.

DisruptOps

DisruptOps

Built for today’s cloud-scale enterprises, DisruptOps’ Cloud Detection and Response platform automates assessment and remediation procedures of critical cloud security issues.

Cyber Security for Europe (CyberSec4Europe)

Cyber Security for Europe (CyberSec4Europe)

CyberSec4Europe is designing, testing and demonstrating potential governance structures for a European Cybersecurity Competence Network.

Avancer Corporation

Avancer Corporation

Avancer Corporation is a multi-system integrator focusing on Identity and Access Management (IAM) Technology. Founded in 2004.

Gridware

Gridware

Gridware is a specialised cybersecurity consultancy firm and an emerging global player in the cybersecurity intelligence and advisory field.

BARR Advisory

BARR Advisory

At BARR Advisory, we build trust through cyber resilience. We help protect the world’s data, people, and information networks through a human-first approach to cybersecurity and compliance.

AuthenticID

AuthenticID

Our mission at AuthenticID is to combat fraud worldwide and help businesses protect their enterprise and valuable data assets.

Pontiro

Pontiro

At Pontiro, we are enabling a new era of data-sharing. Bridging the gap between protected data and valuable insights through the use of cutting edge Homomorphic Encryption.