ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hackers Continuously Target Major Sporting Events

Hackers Continuously Target Major Sporting Events

Sports are a very popular thing around the world, which means that these athletic contests gather many fans to them. In turn, this means that these events are chock full of potential targets for a hacking attack. Today, we’ll examine the assortment of hacks that have taken place around sporting events.

The World Cup
The FIFA World Cup competes with the Olympics in terms of popularity, which would suggest that cybersecurity should be considered a priority - and for many of the quadrennial tournament’s host cities, it is. Once the venue has been announced, it isn’t uncommon for millions of dollars (or the equivalent in the native currency) to be invested in cybersecurity.

As far as cybersecurity is concerned, 2018’s tournament saw no apparent hack of the competition itself. However, this may have been assisted by the fact that Russia, the tournament’s host in 2018, is usually involved in such hacks against sporting events. Furthermore, foreign visitors to Russia are often targeted by these opportunistic hackers.

The World Cup itself has also been targeted by cybercriminals before. In 2014, the official website was removed by a DDoS (Distributed Denial of Service) attack, and thousands fell victim to phishing attacks that left their data exposed. The next World Cup is projected to be just as lucrative for hackers as well.

The Olympic Games
The modern incarnation of the Olympic Games have been held since 1896, with the winter games being established in 1924. As a result, these events have had more than sufficient time to build up a devoted fan base, which also serves as a considerably large feeding ground of sorts for a maliciously-motivated cybercriminal. Furthermore, since these events are only held every four years, administrators should have ample time to prepare for them, but so do hackers.

At the Pyongyang Winter Olympics, the opening ceremonies appeared to be hacked by North Korea. This hack resulted in the website being taken down. Eventually, it was discovered that the true culprit was Russia. This hack was Russia’s way of lashing out after being excluded for the use of state-sponsored performance enhancing drugs.

Just two years earlier, a Russian hacking group called “Fancy Bear” had infiltrated the Olympic databases to steal the personal information of the competing athletes in Rio De Janeiro, Brazil. Gold medal-winning gymnast Simone Biles and tennis legend Venus Williams have both had information leaked as a result of that hack, among others.

The National Football League
The NFL is close to a religion in the United States - a reported third of males who regularly attend church don’t between Labor Day and the New Year. 30 million people watch the pigskin make its way up and down the field each and every week. With so many fans, hackers once again have a sizable pool to exploit.

Roger Goodell, the commissioner of the NFL, had his Twitter feed hacked in 2016. The perpetrator, a teenager from Singapore, used his access to falsely announce that the commissioner had died. In February of 2017, the NFL’s union, the NFLPA, was hacked. As a result, 1,262 people had their information exposed, including financial data and home addresses and phone numbers.

Viewers of Super Bowl XLIII in Tucson, Arizona, were treated to a very unexpected surprise when an adult film suddenly replaced the big game that was being played over in Tampa, Florida. Frank Tanori Gonzalez, the man responsible for the hack, was sentenced to probation in 2009.

Major League Baseball
When your brand makes over $10 billion each year, you prioritize protecting that brand. This is why MLB has always prioritized cybersecurity when league business is on the table. While there have been some small instances of hacking attacks, the real hacking scandal came about as the result of the actions of a team executive.

Chris Correa, the former scouting director for the St. Louis Cardinals, had gained access to the network belonging to the Houston Astros, a rival of the Cardinals. When the Astros moved from the National League to the American league at the end of the 2012 season, they poached the Cardinals’ statistician, Sig Mejdal. However, when he transferred over, Mejdal left his laptop behind. Correa was able to deduce Mejdal’s password, thereby gaining access to the Astros network, and ultimately earning himself a sentence of 46 months in federal prison.

The National Basketball Association
While they aren’t as famous as the Hack-a-Shaq, the NBA has seen its fair share of cyberattacks. One example was when player Ty Lawson had his personal data held for ransom in 2016.

Another scandalous example came from the situation surrounding NBA forward Chris Andersen and 17-year-old model Paris Dylan. A third party, Shelly Chartier, catfished the two of them into not-great circumstances using multiple messaging accounts. Finally, the Douglas County sheriff's department raided Andersen’s home. If there were any lewd materials there that featured Dylan, Andersen would be in possession of child pornography. Fortunately for Andersen and Dylan, Chartier was arrested and sentenced to 19 months jail time, and the two were able to continue their respective careers.

The Professional Golfers’ Association of America
Not long ago, the PGA of America hosted the 100th PGA Championship outside of St. Louis, Missouri, at the Bellerive Country Club. At the same time, the championship itself was host to hackers. Administrators received a message from the hackers, along with the requisite Bitcoin wallet link and instructions: “Your network has been penetrated. All files on each host in the network have been encrypted with a strong algorthym[sic].”

In response, a security firm was hired straightaway to help resolve the issue. With any luck, they will be able to restore the data, but only time will tell.

Other leagues and athletes have had to struggle with hackers as well. The Islamic State in Syria, or ISIS, hacked the English national rugby team’s website, and Chris Froome, four-time champion of the Tour de France, had his performance data hacked when a rival team was convinced that he was using performance-enhancing drugs.

At the end of the day, no matter what your business does, there are going to be hackers out there that would be only too happy to mess with you. If you aren’t protected against these threats, you need to be. The pros at ClearView IT can help. To find out more about defending against internal and external threats, give us a call at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Cybersecurity Phishing IT Services Backup Data Backup Ransomware Smartphone communications Smartphones Microsoft Office Upgrade Small Business Mobile Devices Network Managed IT Services Data Recovery Communication Productivity Quick Tips Social Media Users VoIP Mobile Device Tech Term Automation Business Continuity Facebook Windows 10 Covid-19 Passwords Holiday Disaster Recovery Windows 10 Apps IT Support Browser Managed Service Miscellaneous Cloud Computing Outsourced IT Internet of Things Data Management Remote Work Managed Service Provider Government Saving Money Operating System Gadgets Artificial Intelligence Managed IT services Networking Workplace Strategy Windows Bandwidth Encryption Blockchain Remote Business Technology App Virtualization Mobile Device Management WiFi Spam Information Server Information Technology History Gmail Employee/Employer Relationship Budget Office Two-factor Authentication Office 365 Apple Cybercrime BDR Health Wi-Fi Big Data Analytics Conferencing Access Control Data Security Remote Monitoring Document Management Compliance Employer-Employee Relationship Save Money IT Management Help Desk Training Hacking Remote Computing Voice over Internet Protocol Cost Management Hacker Vendor Patch Management Customer Service Vulnerabilities Unified Threat Management Legal Firewall Search... Project Management Best Practice Augmented Reality Data storage Word Retail IBM Website Alert Data loss Hiring/Firing Outlook BYOD Password Computing Vendor Management Mobile Office Hard Drive Applications Money Managed Services Sports Antivirus Law Enforcement Social How To SaaS Marketing DDoS End of Support Printer Monitoring Maintenance Running Cable Healthcare iPhone Education Storage Cortana Content Filtering Websites Travel Virtual Reality Meetings Mobility Social Engineering Cryptocurrency Router Black Market Google Maps Cleaning Scam User The Internet of Things Windows 11 YouTube Robot VPN Laptop Chrome Remote Workers Update Data Breach Windows 7 Free Resource Twitter Mobile Computing Paperless Office Microchip IT Consultant Solutions Flexibility Physical Security Multi-factor Authentication Customer Relationship Management Integration Images 101 Co-Managed IT Identity Theft Display Entertainment Hack Disaster Notifications Saving Time Unified Communications Start Menu Computer Care Downloads Computers Bitcoin Employees Google Docs Lithium-ion battery Avoiding Downtime Vulnerability Bluetooth Telephone Distributed Denial of Service Software as a Service Office Tips Holidays Private Cloud Processors Memory Data Protection Cooperation HIPAA Excel Video Conferencing Politics Virtual Machines Computer Repair Machine Learning Settings Professional Services Virtual Assistant Solid State Drive Wireless Technology Tech Terms eWaste Managed IT Digital Downtime Chromebook Drones Managed Services Provider Processor PowerPoint Safety Virtual Private Network Taxes Administration Automobile Virtual Desktop Presentation Current Events Specifications How To Experience Legislation Phone System News FinTech File Sharing User Tip Evernote Point of Sale Network Management Redundancy CES IT Assessment Cache Supply Chain Management Value In Internet of Things Staffing Emails Hacks IP Address Fake News Unified Threat Management Organization Network Congestion Workers Cyber security Proxy Server Shortcuts Service Level Agreement Reliable Computing Computing Infrastructure Writing Smart Devices Remote Working CCTV Management Device security Printing Computer Accessories Wireless Headphones Microsoft Excel Touchscreen AI Trend Micro Be Proactive Computer Malfunction Tech Transportation Going Green Scalability Business Cards Emergency Digital Security Cameras Electronic Health Records Text Messaging Competition Vendor Mangement Proactive IT Wasting Time Error Administrator Recovery Bring Your Own Device Samsung eCommerce Bookmark Modem Workplace Strategies Webcam Term LiFi Download Piracy Videos Entrepreneur Uninterrupted Power Supply Surveillance Application Business Mangement Music Managing Costs Documents HTML Nanotechnology Business Intelligence Tablets Browsers SSID Development Google Play Employer/Employee Relationships Upload Troubleshooting Software License Media Supercomputer Virtual Machine Social Network Botnet Securty Google Calendar Smart Technology Screen Reader Rental Service Domains Virus Reviews Micrsooft Optimization Data Analysis Motion Sickness Security Cameras Teamwork Trends Mobile Technology 2FA Flash Comparison Telephone Systems Google Drive Data Storage Business Growth Hypervisor Customer Resource management Devices Fileless Malware Medical IT Tip of the week Shopping Corporate Profile SQL Server Gamification Business Owner Company Culture Knowledge Paperless Regulations Television Banking Public Speaking Telephony PCI DSS Google Wallet Employer Employee Relationship Licensing Telephone System Directions Supply Chain Streaming Media Backup and Disaster Recovery Messenger Gig Economy Deep Learning Cabling Humor Tablet Internet Service Provider G Suite Azure Content Desktop Business Communications Keyboard Accountants Mouse Business Metrics Hard Drives VoIP Regulations Compliance Hosted Solution Tracking Managed IT Service Electronic Medical Records Workplace Database Books intranet Memes Shortcut Net Neutrality Society Web Server Inbound Marketing Wireless Human Resources Language Equifax SharePoint Heating/Cooling Financial Data Environment Digital Payment Health IT Scams Windows XP Tactics Reading Hard Drive Disposal Risk Management Monitors Social Networking Worker IT Visible Light Communication Access Windows 8 Username Google Apps Startup Freedom of Information Time Management Telework Public Cloud Electronic Payment Navigation Microsoft 365 Cables Addiction Relocation email scam Smartwatch Displays Communitications Advertising Spyware Procurement Tech Support Mobile Security Audit Work/Life Balance

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?