• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Qatar World Cup Firms Urged to Upgrade Cyber-Threat Model

You are here: Home / General Cyber Security News / Qatar World Cup Firms Urged to Upgrade Cyber-Threat Model
November 11, 2022

Arranging bodies and vital associates of the FIFA World Cup in Qatar this autumn have been warned to increase their resilience from a prospective barrage of cyber-threats.

Threat intelligence organization Digital Shadows claimed that the world’s most-viewed sporting party would invite scrutiny from a variety of threat actors.

“Scams could existing them selves in lots of forms. For instance, monetarily motivated threat actors often plant in malicious URLs spoofing these situations to fraudulent websites, hoping to optimize their prospects of scamming naive internet consumers for a speedy financial gain,” it warned in a blog put up.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“At the identical time, hacktivist groups might exploit the community focus specified to these events to exponentially boost the access of their message. Point out-sponsored advanced persistent risk (APT) teams may well also decide to goal international sporting situations like the Qatar 2022 Earth Cup to achieve condition aims to the hosting nation or the broader function group.”

Soon after collecting danger details on the party around a 90-working day period of time, the vendor highlighted the vital pitfalls to corporations as:

  • Spoofed domains made to entice people in phishing attacks. Digital Shadows recognized 174 destructive domains impersonating formal webpages
  • Fake cellular apps made to put in adware, steal personal and fiscal information, extract cookies and qualifications, and obtain additional payloads – the scientists discovered 53 of these
  • Bogus social media webpages to unfold frauds, these kinds of as pyramid strategies, or support with social engineering attacks such as small business email compromise (BEC) – Digital Shadows reported it recognized “dozens” of these
  •  Stolen qualifications, which can be employed to hijack corporate or buyer accounts
  • Hacktivists working with DDoS to choose down critical online infrastructure in the name of the war in Ukraine, Iranian involvement or even the host country
  • Ransomware and original entry brokers (IABs)

Electronic Shadows urged organizations to get a risk-dependent solution to cybersecurity ahead of the party, focusing on cyber-hygiene greatest methods such as regular patching, multi-factor authentication (MFA) and phishing recognition.

“A risk-primarily based technique enables your corporation to adapt its cybersecurity system to specific needs and vulnerabilities by taking into consideration the likely effects of a selected phenomenon and its probability,” it concluded.

“As this kind of, along with observing the main threats, it is important to assess the motivations and capabilities of the actors that could possibly carry out malicious strategies from you.”


Some parts of this write-up are sourced from:
www.infosecurity-magazine.com

Previous Post: «move away from memory unsafe languages like c and c++, nsa Move away from memory-unsafe languages like C and C++, NSA urges
Next Post: CISA Says Midterm Voting Uncompromised By Cyber-attacks Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)
  • PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution
  • Securing Data in the AI Era
  • Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
  • Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
  • CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises
  • Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
  • Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
  • Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
  • What Security Leaders Need to Know About AI Governance for SaaS

Copyright © TheCyberSecurity.News, All Rights Reserved.