About Us

IT Services

Electronic Security

Knowledge Center

News & Events



Contact Us

  • Register

Prosper Solutions Blog

Hackers Continuously Target Major Sporting Events

Hackers Continuously Target Major Sporting Events

Sports are a very popular thing around the world, which means that these athletic contests gather many fans to them. In turn, this means that these events are chock full of potential targets for a hacking attack. Today, we’ll examine the assortment of hacks that have taken place around sporting events.

The World Cup
The FIFA World Cup competes with the Olympics in terms of popularity, which would suggest that cybersecurity should be considered a priority - and for many of the quadrennial tournament’s host cities, it is. Once the venue has been announced, it isn’t uncommon for millions of dollars (or the equivalent in the native currency) to be invested in cybersecurity.

As far as cybersecurity is concerned, 2018’s tournament saw no apparent hack of the competition itself. However, this may have been assisted by the fact that Russia, the tournament’s host in 2018, is usually involved in such hacks against sporting events. Furthermore, foreign visitors to Russia are often targeted by these opportunistic hackers.

The World Cup itself has also been targeted by cybercriminals before. In 2014, the official website was removed by a DDoS (Distributed Denial of Service) attack, and thousands fell victim to phishing attacks that left their data exposed. The next World Cup is projected to be just as lucrative for hackers as well.

The Olympic Games
The modern incarnation of the Olympic Games have been held since 1896, with the winter games being established in 1924. As a result, these events have had more than sufficient time to build up a devoted fan base, which also serves as a considerably large feeding ground of sorts for a maliciously-motivated cybercriminal. Furthermore, since these events are only held every four years, administrators should have ample time to prepare for them, but so do hackers.

At the Pyongyang Winter Olympics, the opening ceremonies appeared to be hacked by North Korea. This hack resulted in the website being taken down. Eventually, it was discovered that the true culprit was Russia. This hack was Russia’s way of lashing out after being excluded for the use of state-sponsored performance enhancing drugs.

Just two years earlier, a Russian hacking group called “Fancy Bear” had infiltrated the Olympic databases to steal the personal information of the competing athletes in Rio De Janeiro, Brazil. Gold medal-winning gymnast Simone Biles and tennis legend Venus Williams have both had information leaked as a result of that hack, among others.

The National Football League
The NFL is close to a religion in the United States - a reported third of males who regularly attend church don’t between Labor Day and the New Year. 30 million people watch the pigskin make its way up and down the field each and every week. With so many fans, hackers once again have a sizable pool to exploit.

Roger Goodell, the commissioner of the NFL, had his Twitter feed hacked in 2016. The perpetrator, a teenager from Singapore, used his access to falsely announce that the commissioner had died. In February of 2017, the NFL’s union, the NFLPA, was hacked. As a result, 1,262 people had their information exposed, including financial data and home addresses and phone numbers.

Viewers of Super Bowl XLIII in Tucson, Arizona, were treated to a very unexpected surprise when an adult film suddenly replaced the big game that was being played over in Tampa, Florida. Frank Tanori Gonzalez, the man responsible for the hack, was sentenced to probation in 2009.

Major League Baseball
When your brand makes over $10 billion each year, you prioritize protecting that brand. This is why MLB has always prioritized cybersecurity when league business is on the table. While there have been some small instances of hacking attacks, the real hacking scandal came about as the result of the actions of a team executive.

Chris Correa, the former scouting director for the St. Louis Cardinals, had gained access to the network belonging to the Houston Astros, a rival of the Cardinals. When the Astros moved from the National League to the American league at the end of the 2012 season, they poached the Cardinals’ statistician, Sig Mejdal. However, when he transferred over, Mejdal left his laptop behind. Correa was able to deduce Mejdal’s password, thereby gaining access to the Astros network, and ultimately earning himself a sentence of 46 months in federal prison.

The National Basketball Association
While they aren’t as famous as the Hack-a-Shaq, the NBA has seen its fair share of cyberattacks. One example was when player Ty Lawson had his personal data held for ransom in 2016.

Another scandalous example came from the situation surrounding NBA forward Chris Andersen and 17-year-old model Paris Dylan. A third party, Shelly Chartier, catfished the two of them into not-great circumstances using multiple messaging accounts. Finally, the Douglas County sheriff's department raided Andersen’s home. If there were any lewd materials there that featured Dylan, Andersen would be in possession of child pornography. Fortunately for Andersen and Dylan, Chartier was arrested and sentenced to 19 months jail time, and the two were able to continue their respective careers.

The Professional Golfers’ Association of America
Not long ago, the PGA of America hosted the 100th PGA Championship outside of St. Louis, Missouri, at the Bellerive Country Club. At the same time, the championship itself was host to hackers. Administrators received a message from the hackers, along with the requisite Bitcoin wallet link and instructions: “Your network has been penetrated. All files on each host in the network have been encrypted with a strong algorthym[sic].”

In response, a security firm was hired straightaway to help resolve the issue. With any luck, they will be able to restore the data, but only time will tell.

Other leagues and athletes have had to struggle with hackers as well. The Islamic State in Syria, or ISIS, hacked the English national rugby team’s website, and Chris Froome, four-time champion of the Tour de France, had his performance data hacked when a rival team was convinced that he was using performance-enhancing drugs.

At the end of the day, no matter what your business does, there are going to be hackers out there that would be only too happy to mess with you. If you aren’t protected against these threats, you need to be. The pros at Prosper Solutions can help. To find out more about defending against internal and external threats, give us a call at (617) 369-9977.

Is Antivirus Software Important?
Technology Basics: Read-Only


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, January 17, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Productivity Outsourced IT Training Backup and Disaster Recovery Distributed Denial of Service Windows 7 Telephone Systems Knowledge Hosted Solutions Search Monitors Running Cable Social Media Hacker Scam Cabling Automobile Proxy Server Notifications Best Practice Management Mobile Device Management Enterprise Resource Planning IT Management Network Management HTML Electronic Payment Troubleshooting Managed IT Service Mobile Technology Tactics Cybersecurity Government Tip of the Week Computing Infrastructure Webcam Scalability Tip of the week CCTV Customer Resource management Travel Modem Access Control Equifax VPN BDR Navigation email scam Networking Customer Relationship Management Heating/Cooling IT Business Growth Apps Tech Support Managed Service Provider Experience Staffing Device security Antivirus Service Level Agreement Tablets iPhone Upload Smart Tech Competition Legal Windows 8 Computer Accessories Hard Drive Disposal Books Backup How To Productivity Passwords Efficiency Remote Computing Computers SharePoint Data Analysis Work/Life Balance Communication Network Congestion Unified Threat Management Collaboration Worker Trending Computer Malfunction Mobile Devices Paperless Office Programming Google Play Samsung Business Continuity Distribution In Internet of Things Technology Operating System Printers Data Protection Google Docs Server IT Support Administration Meetings Gmail Evernote Downloads Sports Android Consultation Security Cameras Administrator IT Services Text Messaging Users Reliable Computing Fleet Tracking Data Loss Patch Management Vendor Mangement Document Management cloud computing Wireless Headphones File Sharing Microsoft Excel Teamwork Telephony Tech Term Hacks Redundancy Multi-Factor Security Upgrade Printing G Suite Audit Phone System Computing Piracy WannaCry Printer Budget Business Intelligence Office Tips Emergency Wireless Mobility Bata Backup switches Presentation Downtime Disaster Bitcoin Access Safety IT Consultant Corporate Profile Chromebook Migration Business Metrics Reading Legislation Save Time Data Backup Security cloud storage Physical Security Spyware Banking Remote Monitoring Cost Management Twitter Quick Tips Public Speaking Business Mangement Tablet Congratulations Telephone Storage Hard Drive Fileless Malware Spam Cleaning Gamification Software as a Service Facebook WiFi Business Rental Service Vendor Phishing outsource cloud computing Malware Uninterrupted Power Supply Pain Points Displays Word Applications Product Reviews Database eWaste Hacking Compliance Hosted Solution Intranet Processor Machine Learning Digital Payment Managed IT Deep Learning Taxes Workers Password Tracking Managing Stress Computer Care Company Culture DDoS Directions Saving Money Botnet Data Security Writing VoIP Electricity Best Practices Processing Tech Terms Processors 3D Printing User Error Data storage Law Enforcement Fake News Gadgets Social Networking Dark Web CrashOverride Technology Tips Workplace Tips Data Television Browser Flash Browsers Websites Software License Chrome Sync End of Support Human Resources Network Security History Identity Theft Information Windows XP Lithium-ion battery Router Read Unified Threat Management Hack Mobile Security Virtual Reality Project Management Statistics Microchip Analytic Virtualization Regulation A.I. Windows Server 2008 Windows 10 Productuvuty Internet of Things Best Available Windows10 IBM Business Technology Health hardware Web Server IT service Hackers Google Maps Keyboard Society YouTube News Entertainment Monitoring Website Business Owner Blockchain Domains Patching Private Cloud User Tip Inbound Marketing Proactive IT Healthcare Nanotechnology Windows 10 Managed IT services Touchscreen Firewall Drones Vendor Management Memory Money Bandwidth UTM Accountants uptime Username Digital Flexibility Education Cybercrime Retail Time Management SSID Network Bluetooth Microsoft Office Bring Your Own Device Software USB GDPR Business Cards Shortcut Data Warehousing Saving Time Multi-factor Authentication Automation Fiber-Optic Skype Addiction Employer Employee Relationship Holiday IT Plan Freedom of Information LiFi Specifications Artificial Intelligence Business Computing Electronic Medical Records User Tips Application Google Relocation Startup Supercomputer Citrix Xenapp Marketing Virus Outlook communications HIPAA Ransomware Settings Cortana Internet Gaming Console Entrepreneur PDF Help Desk Windows Value Vulnerability Hard Drives Cache Google Calendar Micrsooft Licensing Mouse Wireless Technology Social Network Vulnerabilities Privacy Upgrades Managed IT Services VoIP Google Drive Connected Devices Content Telephone System IP Address Recovery the Internet of Things Music Hiring/Firing Motion Sickness Cost Risk Management Excel Encryption Office Conferencing Environment IT Support Business Management Public Cloud Data Recovery Wi-Fi Data Management Content Filtering Mobile Computing App Social Engineering Bookmark Email Term Co-Managed IT Streaming Media Documents Error Alert Information Technology Messenger Social clout services PowerPoint Save Money Start Menu Going Green Computer Tech cyber security Employer-Employee Relationship Download Thank You Virtual Assistant Net Neutrality MSP Advertising Laptop Smartphones Digital Signature Innovation Two-factor Authentication Update Assessment Apple Permissions Comparison Maintenance Unified Communications Cryptocurrency Language Managed Service Screen Reader outsource cloud storage Desktop Politics Small Business Data Breach Health IT Solid State Drive cloud Google Wallet Analytics Smartphone Devices Current Events Virtual Desktop Visible Light Communication Mobile Payment Customer Service Trends SaaS Emails Office 365 CIO Fraud User Capital Securty Computer Repair Robot Big data Avoiding Downtime Disaster Recovery Mobile Device Black Market Asset Tracking Augmented Reality BYOD Regulations IT consulting Miscellaneous Finance Microsoft

Latest News & Events

Prosper Solutions is proud to announce the launch of our new website at http://www.prospersolutions.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Prosper Solutions can do for your business.

Call Us Today
Call us today
(617) 369-9977

150 Eastern Ave, Second Floor
Chelsea, Massachusetts 02150