• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Qatar World Cup Firms Urged to Upgrade Cyber-Threat Model

You are here: Home / General Cyber Security News / Qatar World Cup Firms Urged to Upgrade Cyber-Threat Model
November 11, 2022

Arranging bodies and vital associates of the FIFA World Cup in Qatar this autumn have been warned to increase their resilience from a prospective barrage of cyber-threats.

Threat intelligence organization Digital Shadows claimed that the world’s most-viewed sporting party would invite scrutiny from a variety of threat actors.

“Scams could existing them selves in lots of forms. For instance, monetarily motivated threat actors often plant in malicious URLs spoofing these situations to fraudulent websites, hoping to optimize their prospects of scamming naive internet consumers for a speedy financial gain,” it warned in a blog put up.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“At the identical time, hacktivist groups might exploit the community focus specified to these events to exponentially boost the access of their message. Point out-sponsored advanced persistent risk (APT) teams may well also decide to goal international sporting situations like the Qatar 2022 Earth Cup to achieve condition aims to the hosting nation or the broader function group.”

Soon after collecting danger details on the party around a 90-working day period of time, the vendor highlighted the vital pitfalls to corporations as:

  • Spoofed domains made to entice people in phishing attacks. Digital Shadows recognized 174 destructive domains impersonating formal webpages
  • Fake cellular apps made to put in adware, steal personal and fiscal information, extract cookies and qualifications, and obtain additional payloads – the scientists discovered 53 of these
  • Bogus social media webpages to unfold frauds, these kinds of as pyramid strategies, or support with social engineering attacks such as small business email compromise (BEC) – Digital Shadows reported it recognized “dozens” of these
  •  Stolen qualifications, which can be employed to hijack corporate or buyer accounts
  • Hacktivists working with DDoS to choose down critical online infrastructure in the name of the war in Ukraine, Iranian involvement or even the host country
  • Ransomware and original entry brokers (IABs)

Electronic Shadows urged organizations to get a risk-dependent solution to cybersecurity ahead of the party, focusing on cyber-hygiene greatest methods such as regular patching, multi-factor authentication (MFA) and phishing recognition.

“A risk-primarily based technique enables your corporation to adapt its cybersecurity system to specific needs and vulnerabilities by taking into consideration the likely effects of a selected phenomenon and its probability,” it concluded.

“As this kind of, along with observing the main threats, it is important to assess the motivations and capabilities of the actors that could possibly carry out malicious strategies from you.”


Some parts of this write-up are sourced from:
www.infosecurity-magazine.com

Previous Post: «move away from memory unsafe languages like c and c++, nsa Move away from memory-unsafe languages like C and C++, NSA urges
Next Post: CISA Says Midterm Voting Uncompromised By Cyber-attacks Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • FBI Warns of Rising Trend of Dual Ransomware Attacks Targeting U.S. Companies
  • Iranian APT Group OilRig Using New Menorah Malware for Covert Operations
  • New Critical Security Flaws Expose Exim Mail Servers to Remote Attacks
  • Cybercriminals Using New ASMCrypt Malware Loader Flying Under the Radar
  • Lazarus Group Impersonates Recruiter from Meta to Target Spanish Aerospace Firm
  • Post-Quantum Cryptography: Finally Real in Consumer Apps?
  • Microsoft’s AI-Powered Bing Chat Ads May Lead Users to Malware-Distributing Sites
  • Progress Software Releases Urgent Hotfixes for Multiple Security Flaws in WS_FTP Server
  • Cisco Warns of Vulnerability in IOS and IOS XE Software After Exploitation Attempts
  • GitHub Repositories Hit by Password-Stealing Commits Disguised as Dependabot Contributions

Copyright © TheCyberSecurity.News, All Rights Reserved.