facebook linkedin twitter

Hackers Continuously Target Major Sporting Events

Hackers Continuously Target Major Sporting Events

Sports are a very popular thing around the world, which means that these athletic contests gather many fans to them. In turn, this means that these events are chock full of potential targets for a hacking attack. Today, we’ll examine the assortment of hacks that have taken place around sporting events.

The World Cup
The FIFA World Cup competes with the Olympics in terms of popularity, which would suggest that cybersecurity should be considered a priority - and for many of the quadrennial tournament’s host cities, it is. Once the venue has been announced, it isn’t uncommon for millions of dollars (or the equivalent in the native currency) to be invested in cybersecurity.

As far as cybersecurity is concerned, 2018’s tournament saw no apparent hack of the competition itself. However, this may have been assisted by the fact that Russia, the tournament’s host in 2018, is usually involved in such hacks against sporting events. Furthermore, foreign visitors to Russia are often targeted by these opportunistic hackers.

The World Cup itself has also been targeted by cybercriminals before. In 2014, the official website was removed by a DDoS (Distributed Denial of Service) attack, and thousands fell victim to phishing attacks that left their data exposed. The next World Cup is projected to be just as lucrative for hackers as well.

The Olympic Games
The modern incarnation of the Olympic Games have been held since 1896, with the winter games being established in 1924. As a result, these events have had more than sufficient time to build up a devoted fan base, which also serves as a considerably large feeding ground of sorts for a maliciously-motivated cybercriminal. Furthermore, since these events are only held every four years, administrators should have ample time to prepare for them, but so do hackers.

At the Pyongyang Winter Olympics, the opening ceremonies appeared to be hacked by North Korea. This hack resulted in the website being taken down. Eventually, it was discovered that the true culprit was Russia. This hack was Russia’s way of lashing out after being excluded for the use of state-sponsored performance enhancing drugs.

Just two years earlier, a Russian hacking group called “Fancy Bear” had infiltrated the Olympic databases to steal the personal information of the competing athletes in Rio De Janeiro, Brazil. Gold medal-winning gymnast Simone Biles and tennis legend Venus Williams have both had information leaked as a result of that hack, among others.

The National Football League
The NFL is close to a religion in the United States - a reported third of males who regularly attend church don’t between Labor Day and the New Year. 30 million people watch the pigskin make its way up and down the field each and every week. With so many fans, hackers once again have a sizable pool to exploit.

Roger Goodell, the commissioner of the NFL, had his Twitter feed hacked in 2016. The perpetrator, a teenager from Singapore, used his access to falsely announce that the commissioner had died. In February of 2017, the NFL’s union, the NFLPA, was hacked. As a result, 1,262 people had their information exposed, including financial data and home addresses and phone numbers.

Viewers of Super Bowl XLIII in Tucson, Arizona, were treated to a very unexpected surprise when an adult film suddenly replaced the big game that was being played over in Tampa, Florida. Frank Tanori Gonzalez, the man responsible for the hack, was sentenced to probation in 2009.

Major League Baseball
When your brand makes over $10 billion each year, you prioritize protecting that brand. This is why MLB has always prioritized cybersecurity when league business is on the table. While there have been some small instances of hacking attacks, the real hacking scandal came about as the result of the actions of a team executive.

Chris Correa, the former scouting director for the St. Louis Cardinals, had gained access to the network belonging to the Houston Astros, a rival of the Cardinals. When the Astros moved from the National League to the American league at the end of the 2012 season, they poached the Cardinals’ statistician, Sig Mejdal. However, when he transferred over, Mejdal left his laptop behind. Correa was able to deduce Mejdal’s password, thereby gaining access to the Astros network, and ultimately earning himself a sentence of 46 months in federal prison.

The National Basketball Association
While they aren’t as famous as the Hack-a-Shaq, the NBA has seen its fair share of cyberattacks. One example was when player Ty Lawson had his personal data held for ransom in 2016.

Another scandalous example came from the situation surrounding NBA forward Chris Andersen and 17-year-old model Paris Dylan. A third party, Shelly Chartier, catfished the two of them into not-great circumstances using multiple messaging accounts. Finally, the Douglas County sheriff's department raided Andersen’s home. If there were any lewd materials there that featured Dylan, Andersen would be in possession of child pornography. Fortunately for Andersen and Dylan, Chartier was arrested and sentenced to 19 months jail time, and the two were able to continue their respective careers.

The Professional Golfers’ Association of America
Not long ago, the PGA of America hosted the 100th PGA Championship outside of St. Louis, Missouri, at the Bellerive Country Club. At the same time, the championship itself was host to hackers. Administrators received a message from the hackers, along with the requisite Bitcoin wallet link and instructions: “Your network has been penetrated. All files on each host in the network have been encrypted with a strong algorthym[sic].”

In response, a security firm was hired straightaway to help resolve the issue. With any luck, they will be able to restore the data, but only time will tell.

Other leagues and athletes have had to struggle with hackers as well. The Islamic State in Syria, or ISIS, hacked the English national rugby team’s website, and Chris Froome, four-time champion of the Tour de France, had his performance data hacked when a rival team was convinced that he was using performance-enhancing drugs.

At the end of the day, no matter what your business does, there are going to be hackers out there that would be only too happy to mess with you. If you aren’t protected against these threats, you need to be. The pros at Computerware can help. To find out more about defending against internal and external threats, give us a call at (703) 821-8200.

Is Antivirus Software Important?
Technology Basics: Read-Only
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, January 19, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Software Hackers Business Computing Business Management Microsoft Data Workplace Tips Backup Managed Service Provider Productivity Hardware Business Network Security Saving Money Malware Email Hosted Solutions IT Services IT Support Efficiency Google Small Business Computer Quick Tips Smartphones User Tips Mobile Devices Gadgets Innovation Business Continuity Disaster Recovery Social Media Android Microsoft Office Mobile Office Virtualization Network VoIP Data Backup Server Mobile Device Management Collaboration Communication Smartphone Data Recovery Productivity Miscellaneous Ransomware Windows 10 Upgrade Tech Term IT Support Unified Threat Management Windows Facebook Operating System Holiday communications Remote Monitoring Passwords Cybersecurity Apps BYOD Managed IT services Remote Computing Mobile Computing Vendor Management Users Phishing WiFi BDR Marketing Mobile Device Automation Analytics The Internet of Things Firewall History Apple Outsourced IT Browser Save Money Managed IT Services Alert Data Management Artificial Intelligence Internet of Things Encryption App Big data IT Consultant Bandwidth Antivirus Maintenance Printer Office Content Filtering Going Green Health Gmail Spam Bring Your Own Device Wireless Technology Hiring/Firing Hard Drives Outlook Windows 8 Managed IT Cybercrime Search Business Technology Saving Time Cloud Computing Cost Management Virus Tech Support Lithium-ion Battery Windows 10 Office 365 Best Practice Information Technology Budget Two-factor Authentication Help Desk Document Management Recovery Employer-Employee Relationship Blockchain Computers VPN Hacking Travel Update IBM Phone System Training Access Control Money Website Law Enforcement Government Hard Drive Administration Proactive IT Compliance It Management Running Cable Mobility Data storage Humor Information Intranet Twitter Education Healthcare Legal Networking Regulations Risk Management Applications SaaS Customer Service Save Time Managed Service File Sharing Securty Comparison Tablet Company Culture Fax Server Solid State Drive Google Maps Data Security Computer Repair Social Networking Word Patch Management Black Market Social Engineering Flexibility Value Cryptocurrency Avoiding Downtime Data Loss Password Cortana Scam Laptop iPhone Hacker Business Growth Data Breach Excel Project Management Digital Websites User Machine Learning Paperless Office Customer Relationship Management Telephone Systems Sports Business Intelligence Computing Disaster Augmented Reality Digital Payment Social Current Events PowerPoint Router Downtime Hosted Solution Wireless End of Support DDoS Robot IT service Webcam Storage Identity Theft Text Messaging Bitcoin Trending Vendor Lifestyle Monitoring Data Protection Mouse Politics Bluetooth Retail Virtual Reality Programming Automobile Statistics eWaste Emails Network Congestion Management Chromebook Inbound Marketing Computing Infrastructure Hack Google Docs Redundancy Vulnerabilities Experience How To Streaming Media Private Cloud Cleaning Pain Points Processors Download Monitors Office Tips Evernote USB Presentation Telephony Net Neutrality Microchip YouTube Taxes Unified Communications Settings Start Menu Tech Terms Chrome Specifications Safety Distributed Denial of Service Virtual Desktop Mobile Technology Software as a Service User Error Public Cloud Gaming Console Documents Co-managed IT Conferencing Uninterrupted Power Supply Computer Accessories Entertainment Heating/Cooling Vulnerability Software License Managed IT Service Trends Sync GPS Spyware Mobile Payment Multi-Factor Security Cost External Harddrive Fraud Bookmark Tactics Music Electricity Printing LinkedIn PDF Devices Notifications switches CCTV Writing Keyboard Reliable Computing UTM Google Play Content Business Metrics Computer Malfunction Upgrades Windows 7 Best Available LiFi Thin CLient Archive Domains IT Plan Processor Enterprise Resource Planning In Internet of Things 3D Ebay cache Television Skype Legislation Error Smart Phones Public Speaking email scam Browsers Best Practives Addiction WannaCry Downloads Accountants A.I. Shortcut User Tip Scalability Work/Life Balance Corporate Profile Multi-factor Authentication Security Cameras Motion Sickness Deep Learning Time Management Freedom of Information Point of Contact Wireless Headphones Microserver Telephone Messenger Visible Light Communication Tracking Memory Leadership Troubleshooting Migration Navigation Connected Devices Adminstration Pirating Information Assessment SharePoint Entrepreneur Tip of the week HIPAA Data Analysis Network Management Google Calendar Environment Equifax Fleet Tracking Rental Service IT consulting Meetings News Analytic Competition Get More Done Cabling VoIP Recycling Electronic Payment Device security GDPR MSP Web Server Touchscreen Nanotechnology Turn Key Social Network Books Advertising Workers Flash Knowledge Business Owner Desktop Tech Printer Server Finance Wi-Fi CIO Administrator Consultation Product Reviews Windows XP Supercomputer Virtual Assistant Read IP Address Business Cards Fileless Malware Trojan Service Level Agreement Staffing Google Wallet Technology Tips Startup Asset Tracking Fake News Application Unified Threat Management Proxy Server Backup and Disaster Recovery Society Worker Upselling Audit Human Resources Modem Organize Username Displays Electronic Medical Records Screen Reader Customer Resource management Reading Samsung Device Management Term Gamification Micrsooft Video Surveillance Data Warehousing Employer Employee Relationship Saving ZTime Emergency Hard Drive Disposal Content Management Piracy Directions Upload G Suite Drones Access Business Managemenet Smart Tech Distribution Microsoft Excel Digital Signature Fiber-Optic Dark Web Database Licensing Computer Care HTML SSID Hacks Physical Security Health IT Telephone System Relocation Permissions Tablets Language Harddrive online Currency Mobile Security Processing Webinar Banking Botnet Debate Google Drive Windows Server 2008 Teamwork Cooperation Regulation Medical IT CrashOverride 3D Printing Printers Capital Productuvuty Managing Stress

toner1