Expect A Cyber Attack On The FIFA World Cup In Russia

A survey of expert delegates attending the recent Infosecurity Europe 2018 show reveals that 72% of security professionals believe a cyberattack on this year’s FIFA World Cup in Russia is likely. 

This statistic reinforces the trend toward cyber attacks targeting high profile international events, such as the attack that took down the Winter Olympics website in February of this year.

“Cybercriminals do not exist in a vacuum,” said Andy Norton, director of threat intelligence at Lastline. “They will be aware of the immense media scrutiny the World Cup will be under, and will be hoping to capitalise on this as well as the financial opportunities such a unique event presents.”

Just over 70% of the info-security professionals who thought there would be an attack expect the attack vector to focus on network infrastructure, such as a DDoS attack, or on social media channels. An additional 44% thought email correspondence was at risk, and 47% said mobile threats could be a risk.

“While we do not know where the threat will come from, or what form it will take, it’s highly likely that cyber-criminals are devising plans for a cyberattack,” continued Norton. 

“The attack vectors used will vary depending on the threat actor and their individual motivations. An event like this, could see many different forms of attack from fake ticket spam to infiltration attempts into governing body infrastructure or even destructive payloads witnessed at the recent winter Olympics.”

While this news should undoubtedly come as a worry to infosec professionals, they clearly are not overly concerned as 83% believe that the FIFA World Cup does not pose a risk to their organisation. 

Also, it has not stopped some of them from getting in to the party spirit, with 30% suggesting they would wait until after a crucial match to fix an urgent corporate security issue, and almost 40% suggesting they would use a work device or working hours to watch a match, even if this was against corporate policy.

Last Line

You Might Also Read: 

Hackers Strike Winter Olympics:

Meet The Fancy Bears:


 

« EC-Council Sets New Application Security Training Standards
Facebook’s Head Of Policy Quits Amid Data Misuse Controversey »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Paladion

Paladion

Paladion is a provider of managed IT security services.

Disklabs

Disklabs

Disklabs are industry leaders in data recovery, digital forensics and data erasure.

PCI Compliance Guide

PCI Compliance Guide

The PCI Compliance Guide is one of the leading educational websites available focused exclusively on PCI compliance.

Ericsson

Ericsson

Ericsson is a leading provider of telecommunications services and network infrastructure solutions including all aspects of network security.

TunnelBear

TunnelBear

TunnelBear is a Virtual Private Network services provider offering secure encrypted access to the internet.

Recovery Point Systems

Recovery Point Systems

Recovery Point is a leading national provider of IT secure and compliant infrastructure and business resilience services.

Knovos

Knovos

Knovos is a leading technology innovator developing solutions for automating, integrating, and innovating Information Governance.

RhodeCode

RhodeCode

RhodeCode is an open source repository management platform. It provides unified security and team collaboration across Git, Subversion, and Mercurial.

Ampyx Cyber

Ampyx Cyber

Ampyx Cyber (formerly Ampere Industrial Security) is an industrial security firm. We specialize in industrial control systems (ICS) and operational technology (OT) security.

BT Security

BT Security

BT provides telecommunications and network infrastructure services to keep businesses around the world connected and secure.

CyberScotland

CyberScotland

The CyberScotland Partnership is a collaboration of key strategic stakeholders, brought together to focus efforts on improving cyber resilience across Scotland in a coordinated and coherent way.

Intaso

Intaso

Intaso are a boutique head hunting and talent solution firm with specialist Cyber and Information Security expertise.

Argenta Talent Acquisition

Argenta Talent Acquisition

Argenta Talent Acquisition is a recruitment partner specializing in Space and Defense, Intelligence Community, all things Technical, Cyber, and Logistics.

Fusion5

Fusion5

Fusion5 is a leading ANZ Business Services and IT Solutions provider. Our customers trust us to make their potential reality by providing advisory, IT project deployment, and managed services.

Ncontracts

Ncontracts

Our mission at Ncontracts is to continually improve our clients’ ability to manage risk and compliance.

Liquid C2

Liquid C2

Liquid C2 offers leading solutions to streamline workplace operations, secure cloud storage, rapid data recovery, and scale growth.