• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • Contact Us

iHash

News and How to's

  • The 2023 Adobe Creative Cloud Beginner to Advance Bundle for $59

    The 2023 Adobe Creative Cloud Beginner to Advance Bundle for $59
  • The Complete 2023 Business Accounting Mastery Bundle for $49

    The Complete 2023 Business Accounting Mastery Bundle for $49
  • Universal VR Set Glasses Goggle Bundle for PC Android Phone for iPhone for $125

    Universal VR Set Glasses Goggle Bundle for PC Android Phone for iPhone for $125
  • Scanner Device Detector for GPS Tracker Wireless Listening Device Camera Finder 5 Levels Sensitivity 25H Working Time for $44

    Scanner Device Detector for GPS Tracker Wireless Listening Device Camera Finder 5 Levels Sensitivity 25H Working Time for $44
  • VYSN RockinPods TWS Waterproof Bluetooth Earbuds for $24

    VYSN RockinPods TWS Waterproof Bluetooth Earbuds for $24
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

FIFA World Cup 2022: Soccer Cyberthreats

Nov 30, 2022 by iHash Leave a Comment


Just in case you haven’t noticed, Qatar is currently hosting the 22nd FIFA World Cup (from November 20 to December 18). Cyberfraudsters could hardly pass up such an opportunity. The 2018 World Cup in Russia was watched by 3.6 billion people (more than half of the world’s population over four years old), and the viewing figures of Qatar’s World Cup are unlikely to be lower. Having analyzed the main cyberthreats targeting fans at major sporting events in recent years, we can only recommend you be vigilant during the World Cup.

Table of Contents

  • Fake sites and apps
  • Privacy issues
  • Beware of free Wi-Fi
    • 1. Turn off automatic connection to Wi-Fi networks
    • 2. Carefully check the names of networks you connect to
    • 3. Don’t use public Wi-Fi for critical tasks
    • 4. Use a VPN

Fake sites and apps

In the runup to all major sporting feasts in recent years, our experts have observed upticks in registrations of domains based on the names of the respective events. Most of these sites were used for fraud, such as offering fake tickets or free live broadcasts.

A phishing page offers a chance to win 2 FIFA tickets

A phishing page offers a chance to win 2 FIFA tickets

This year’s World Cup has been no exception. By the time it kicked off, experts had uncovered multiple fraudulent pages on social networks, and more than 170 domains posing as official World Cup resources.

Most are phishing sites looking to steal user data, but alongside the traditional scams (ticket giveaways, souvenir sales), some new cryptocurrency-based scams have been added. Soccer fans are invited to invest in new tokens created specially for the tournament, or to bet on the results with payouts in crypto or as NFT art. Of course, to receive your “winnings”, you have to share your cryptowallet details.

An example of a World Cup-related crypto scam

An example of a World Cup-related crypto scam

Mobile apps are another classic mode of attack, especially on Android users: by the start of the World Cup, more than 50 instances of mobile malware had been detected that either plant malicious software on your device, ask you to pay for a bogus ticket or broadcast, or steal your personal data — passwords, mail accounts, card numbers, and the like.

 

A study of past championships indicates that the victims of sports-related scams are typically casual fans: folks looking for streaming sites or installing sports apps for the first time. Therefore, in addition to our standard advice (never visit suspicious sites or download suspicious applications), we would add another useful tip: if you’re a novice, ask a friend who’s long been into sports. They’ll be able to suggest the best places for live streaming or placing bets, which will help you avoid fly-by-night sites and fraudulent apps.

Privacy issues

But even official apps don’t guarantee protection against personal data leaks. On the eve of the current World Cup, warnings were already sounding about privacy issues in apps that visitors to Qatar have to install. Similar vulnerabilities making it possible to spy on users were found in Chinese apps that guests of this year’s Winter Olympics were required to install.

But if you think such problems affect only certain countries, alas, personal data leaks happen everywhere. At the 2020 Summer Olympics in Tokyo (which ran in 2021 due to  covid disruption), the usernames and passwords of those who’d bought tickets were leaked, giving cybercriminals access to masses of personal data in fans’ accounts: names, addresses, bank details. And in 2018, the official app of the Spanish soccer league, La Liga, was caught red-handed using microphone and GPS access on user devices to track down those watching pirated broadcasts. La Liga, of course, denied eavesdropping on users, since the audio clips it recorded were encrypted. But how could this be checked, and who then did listen to these recordings?

As such, a general security rule that applies even to official apps is to minimize their access to your personal data and to other apps and systems on your smartphone. If installing an app with extended privileges is mandatory in the host country, use a burner phone instead of your main device.

Beware of free Wi-Fi

During the 2016 Summer Olympics in Brazil, Kaspersky researchers found that around a quarter of Wi-Fi hotspots at competition venues had little or no security at all. Similar studies during the 2018 FIFA World Cup in Russia uncovered even more unprotected Wi-Fi networks.

So, if you’re off to Qatar, take every precaution when using public Wi-Fi:

1. Turn off automatic connection to Wi-Fi networks

Also turn off Wi-Fi itself when not using it, and remove public Wi-Fi networks from the list of connections after using them. This will safeguard against connecting to poorly protected access points where your data could be intercepted by cybercriminals.

2. Carefully check the names of networks you connect to

Fake hotspots might have similar names to the Wi-Fi network of your hotel or the cafe you’re in. If you fail to spot a fake Wi-Fi network and connect to it, the data you transmit will end up in cybercriminal hands.

3. Don’t use public Wi-Fi for critical tasks

For the same reasons, be doubly sure not to connect to dubious hotspots if you have to use a service where a data leak could be very costly, such as online banking. Better to access it through a well-protected home or corporate network. Although more expensive, even using mobile data to get online is safer than free public Wi-Fi.

4. Use a VPN

If there’s simply no other option but to connect to an unknown Wi-Fi network, use a security solution with VPN technology to create an encrypted communication channel. For example, Kaspersky Secure Connection. KSC encrypts your data before forwarding it to the Wi-Fi router, so other users — not even the hotspot owner — can see what you’re sending or where. And it’s a good idea to configure your VPN to start up automatically on connecting to any public network.





Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: Security Tagged With: Cup, cyberthreats, FIFA, Soccer, world

Special Offers

  • The 2023 Adobe Creative Cloud Beginner to Advance Bundle for $59

    The 2023 Adobe Creative Cloud Beginner to Advance Bundle for $59
  • The Complete 2023 Business Accounting Mastery Bundle for $49

    The Complete 2023 Business Accounting Mastery Bundle for $49
  • Universal VR Set Glasses Goggle Bundle for PC Android Phone for iPhone for $125

    Universal VR Set Glasses Goggle Bundle for PC Android Phone for iPhone for $125
  • Scanner Device Detector for GPS Tracker Wireless Listening Device Camera Finder 5 Levels Sensitivity 25H Working Time for $44

    Scanner Device Detector for GPS Tracker Wireless Listening Device Camera Finder 5 Levels Sensitivity 25H Working Time for $44
  • VYSN RockinPods TWS Waterproof Bluetooth Earbuds for $24

    VYSN RockinPods TWS Waterproof Bluetooth Earbuds for $24

Reader Interactions

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

New Survey Finds Consumers Give Chatbots a Failing Grade in Customer Experience

Feb 7, 2023 By iHash

Cisco Secure at Cisco Live EMEA 2023

Cisco Secure at Cisco Live EMEA 2023

Feb 7, 2023 By iHash

Tags

* Apple Cisco computer security cyber attacks cyber crime cyber news cybersecurity Cyber Security cyber security news cyber security news today cyber security updates cyber threats cyber updates data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS 7 iOS 8 iPhone Malware microsoft network security ransomware ransomware malware risk management Secure security security breaches security vulnerabilities software vulnerability the hacker news Threat update video Vulnerabilities web applications

Latest

Dotan Horovits

Is Kubernetes Monitoring Flawed? | Logz.io

Kubernetes has come a long way, but the current state of Kubernetes open source monitoring is in need of improvement. This is in part due to the issues related to an unnecessary volume of data related to that monitoring. For example, a 3-node Kubernetes cluster with Prometheus will ship around 40,000 active series by default. […]

The 2023 Adobe Creative Cloud Beginner to Advance Bundle for $59

Expires November 25, 2122 23:59 PST Buy now and get 97% off Adobe Acrobat Pro DC (Beginner) KEY FEATURES Workplace demand for digital media skills including creating, managing, and integrating PDF documents is on the rise. In this course, students will learn the basics of creating PDF documents and modifying PDFs within Adobe Acrobat DC […]

Cisco secures IoT, keeping security closer to networking

Cisco secures IoT, keeping security closer to networking

The use of unmanaged and IoT devices in enterprises is growing exponentially, and will account for 55.7 billion connected devices by the end of 2025. A critical concern is deploying IoT devices without requisite security controls.  While these numbers are numbing, their reality is undeniable. 90% of customers believe digitization has accelerated the importance placed upon security. The World […]

GuLoader Malware Using Malicious NSIS Executables to Target E-Commerce Industry

Feb 06, 2023Ravie LakshmananCyber Attack / Endpoint Security E-commerce industries in South Korea and the U.S. are at the receiving end of an ongoing GuLoader malware campaign, cybersecurity firm Trellix disclosed late last month. The malspam activity is notable for transitioning away from malware-laced Microsoft Word documents to NSIS executable files for loading the malware. […]

Scanner Device Detector for GPS Tracker Wireless Listening Device Camera Finder 5 Levels Sensitivity 25H Working Time for $44

Expires January 31, 2123 18:01 PST Buy now and get 61% off PRODUCT SPECS Batteries Required? Yes Power Source Battery Powered Item Dimensions LxWxH 4.1 x 0.97 x 0.58 inches Battery Life 25 Hours function logProductOverviewMetric(metric) { if(typeof window.csa !== ‘undefined’) { var myEvents = csa(“Events”, {producerId: “dppinfo”}); myEvents(“log”, { schemaId: “dppinfo.productOverviewClientSideEvents.1”, eventName: metric }, […]

FormBook Malware Spreads via Malvertising Using MalVirt Loader to Evade Detection

Feb 06, 2023Ravie LakshmananMalvertising / Data Safety An ongoing malvertising campaign is being used to distribute virtualized .NET loaders that are designed to deploy the FormBook information-stealing malware. “The loaders, dubbed MalVirt, use obfuscated virtualization for anti-analysis and evasion along with the Windows Process Explorer driver for terminating processes,” SentinelOne researchers Aleksandar Milenkoski and Tom […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2023
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT