While football might be coming home, keep cyber attacks away!

Keeping users safe from heightened threats
As the World Cup gets into full swing, many issues outside the actual football seem to be dominating the discussion. One of these is cyber security, and the global nature and scale of the tournament means it is a natural target for hackers.

These attacks are known to be targeting the World Cup’s brand integrity, ransom threats, physical security, and data governance or leaks. With global TV and online audiences in the billions, as well as ticket sales, merchandise and other products and services changing hands, the World Cup is like a pick and mix counter for cyber criminals. From phishing emails to fake URLs and fraudulent websites, the threats can be financially-motivated for quick profiteering.

The nature of cyber threats

So far, over 170 domains have been uncovered that attempt to impersonate World Cup websites, applications or emails. This includes over 53 fake applications that install malware on users’ devices to run illegal adware, steal or encrypt data, harvest password details and personal information, and promote fake marketing or sales initiatives.

There have also been more sophisticated threats identified that target the tournament’s organisers, stadiums, ticketing merchants, sponsors, staff, and national teams themselves. These organisations are at risk of being targeted by groups looking to disrupt for political reasons and/or for financial gain. Ransomware such as Redline and Lockbit are known to be active in and around the World Cup.

Secure your business

Every month, our partners the South West Cyber Resilience Centre (SWCRC) are providing some top tips to shore up your business from cyber attacks. The SWCRC is led by serving police officers, as part of a not-for-profit partnership with businesses and academia.

➡️ Read November's guidance.

More in Cyber Security
Manipulator or Listener
Manipulator or Listener

Navigating Emotional Intelligence in Cyber Security


Shadow AI
Shadow AI

What Is It and Why Does It Matter? 


Is Compliance Enough?
Is Compliance Enough?

Understanding the Gap Between Cybersecurity and Regulation


SMB cybersecurity tips
SMB cybersecurity tips

Monthly expert guidance from the South West Cyber Resilience Centre.


A CxO's guide to cyber security in action
A CxO's guide to cyber security in action

Keep your organisation safe, agile, growth-ready and prepared for whatever comes next.


Is it time to replace your SIEM?
Is it time to replace your SIEM?

Facing high data ingestion costs, on-prem only or lacking actionable insights?


What is next-gen firewall and why does it matter?
What is next-gen firewall and why does it matter?

The what, how and why of NGFWs for your organisation


Top 5 critical capabilities of a detection and response platform
Top 5 critical capabilities of a detection and response platform

Key things to consider when protecting your business


GenAI and the CISO
GenAI and the CISO

Security best practices, threat management, security operations, tooling and privacy


5 signs your Wi-Fi might be hacked and 7 ways to protect it!
5 signs your Wi-Fi might be hacked and 7 ways to protect it!

How to spot and prevent hacking attempts


Wrap up of CyberSync 2024 and a look ahead to next year
Wrap up of CyberSync 2024 and a look ahead to next year

8 sponsors | 4 expert speakers | 2 days, 200 security professionals | 2 evenings = 200+ channel partners


Identity theft alert!
Identity theft alert!

SWCRC's top tips to secure your organisation


Share this story

We're a community where IT security buyers can engage on their own terms.

We help you to better understand the security challenges associated with digital business and how to address them, so your company remains safe and secure.

Interested in what you see? Get in touch, and let's start a conversation Get in touch