Super Bowl LVIII Presents a Vast Attack Surface for Threat Actors

The outcome of this year's Super Bowl matchup between the Kansas City Chiefs and the San Francisco 49ers on Feb. 11 at the Allegiant Stadium in Las Vegas will likely remain unknown until the last down of the game.
The NFL's continuing digitization of almost all aspects of the event, from ticketing to gate access systems and virtually every other point of contact with fans, has opened new vulnerabilities and targets that its security team has had to secure.
Concerns include threats to arena security, ransomware attacks on critical systems, phishing and credential theft, and threats to personal data and other sensitive information belonging to fans, NFL employees, players, and coaches.
Preparing for the Big Game In a conversation with Dark Reading at the beginning of the 2023/2024 season, NFL CISO Tomás Maldonado had identified AI-enabled phishing attacks and deepfake audio and video scams as adding to the slew of other existing security challenges the league has had to contend with in general.
The NFL itself has been preparing for some time to identify and assess threats to the Super Bowl-easily the most watched TV event each year-and to implement plans for dealing with them.
Last September, league officials in coordination with 100 other stakeholders, including the US Department of Homeland Security and the Cybersecurity and Infrastructure Agency, conducted a tabletop exercise where they ran through a series of attack scenarios that together had a cascading impact on physical systems supporting the event.
The Security Implications of Sporting Event Digitization Karl Mattson, field CISO at Noname Security, views API-related security issues as likely a big focus for attackers this year, given the NFL's extensive digital transformation in recent years.
The most likely scenario, if an API-related attack were to happen, is a large-scale compromise of NFL fan personal information stolen, which may include authentication or biometric information, he notes.
The same is true for advertisers who air commercials during the event, and set up a new website or service to field consumer response.
Mattson points to the memorable 2022 Super Bowl ad by Coinbase that included only a bouncing QR code, which pointed viewers to a promotion website the company had set up for the ad. The website ended up crashing shortly after the ad aired because of the sheer volume of visitors.
Physical event-specific and public infrastructure to support the Super Bowl are also enabled by API-first technologies.
The stadium's 5G network, local security and emergency services, and public utility systems all use API-based services for routine operations that attackers could potentially seek to disrupt, Mattson says.
The phenomenon has created a breeding ground for new and evolving scams targeting events like the Super Bowl, says Stuart Wells, CTO at Jumio.
Exacerbating the situation is the relative lack of privacy protections in many of the betting apps that people use to make wagers during events like the Super Bowl.
A new study by data privacy company Incogni examined seven of the most popular betting apps; most of them are collecting and sharing private data extensively without proper disclosure.
The biggest data hog was DraftKings, which Incogni found was gathering 22 data points from users, including their precise location, contacts, messages, photos, and videos.
Betting apps from Caesars, Sky Bet, and William Hill were relatively close behind, gathering 17 data points each, including precise location, in-app search history, health information, and purchase histories.
Caesars led the rest when it came to sharing the data it collects from user devices with third parties.
Super Bowl fans should also expect a surge of fake tickets and counterfeit merchandise in online marketplaces, tempting fans with jerseys, hats, and memorabilia that look real but are cheaply made and lack official logos, Well says.
Risks to organizations that permit work-related devices for personal use without any controls include a heightened likelihood of malware infections and phishing attacks.


This Cyber News was published on www.darkreading.com. Publication date: Thu, 08 Feb 2024 17:25:22 +0000


Cyber News related to Super Bowl LVIII Presents a Vast Attack Surface for Threat Actors

Super Bowl LVIII Presents a Vast Attack Surface for Threat Actors - The outcome of this year's Super Bowl matchup between the Kansas City Chiefs and the San Francisco 49ers on Feb. 11 at the Allegiant Stadium in Las Vegas will likely remain unknown until the last down of the game. The NFL's continuing digitization of ...
9 months ago Darkreading.com
7 Best Attack Surface Management Software for 2024 - Attack surface management is a relatively new cybersecurity technology that combines elements of vulnerability management and asset discovery with the automation capabilities of breach and attack simulation and applies them to an organization's ...
11 months ago Esecurityplanet.com
Attack Vector vs Attack Surface: The Subtle Difference - Cybersecurity discussions about "Attack vectors" and "Attack surfaces" sometimes use these two terms interchangeably. This article guides you through the distinctions between attack vectors and attack surfaces to help you better understand the two ...
1 year ago Trendmicro.com
Attack Surface Management: What is it? Why do you need it? - Traditional asset inventory and vulnerability management software can't keep up to date with the growing attack surface and morphing vulnerabilities. Contrary to other cybersecurity software, Attack Surface Management software operates from a ...
11 months ago Securityboulevard.com
Staying ahead of threat actors in the age of AI - At the same time, it is also important for us to understand how AI can be potentially misused in the hands of threat actors. In collaboration with OpenAI, today we are publishing research on emerging threats in the age of AI, focusing on identified ...
9 months ago Microsoft.com
Limiting Remote Access Exposure in Hybrid Work Environments - Organizations have shifted to remote desktop work environments at an increasing speed since then - simultaneously expanding their attack surface and exposing themselves to greater cybersecurity threats. The remote work revolution has pushed companies ...
11 months ago Securityboulevard.com
Detectify platform enhancements address growing attack surface complexity - Detectify announced a new Domains page and major improvements to existing capabilities for setting custom attack surface policies. These updates bring control over attack surface data and enable organizations to seamlessly configure alerts for policy ...
5 months ago Helpnetsecurity.com
Operation Morpheus took down 593 Cobalt Strike servers used by threat actors - Threat actors actively exploit D-Link DIR-859 router flaw CVE-2024-0769. Experts released PoC exploit code for a critical bug in Progress Telerik Report Servers. Threat actors may have exploited a zero-day in older iPhones, Apple warns. Nation-state ...
4 months ago Securityaffairs.com
A Cybersecurity Risk Assessment Guide for Leaders - Now more than ever, keeping your cyber risk in check is crucial. In the first half of 2022's Cyber Risk Index, 85% of the survey's 4,100 global respondents said it's somewhat to very likely they will experience a cyber attack in the next 12 months. ...
1 year ago Trendmicro.com
TeamCity Intrusion Saga: APT29 Suspected Among the Attackers Exploiting CVE-2023-42793 - As part of this analysis, we look at threat actor TTPs employed throughout the intrusion and how they were identified and pieced together by the FortiGuard IR team. The following section of this report focuses on the activities of one of these threat ...
11 months ago Feeds.fortinet.com
Threat actors misuse OAuth applications to automate financially driven attacks - Threat actors are misusing OAuth applications as an automation tool in financially motivated attacks. Threat actors compromise user accounts to create, modify, and grant high privileges to OAuth applications that they can misuse to hide malicious ...
11 months ago Microsoft.com
Top 7 Cyber Threat Hunting Tools for 2024 - Cyber threat hunting is a proactive security measure taken to detect and neutralize potential threats on a network before they cause significant damage. To seek out this type of threat, security professionals use cyber threat-hunting tools. With ...
9 months ago Techrepublic.com
How to Use Threat Intelligence Feeds for SOC/DFIR Teams - Threat intelligence feeds provide real-time updates on indicators of compromise, such as malicious IPs and URLs. Security systems can then ingest these IOCs to identify and block potential threats, which essentially grants organizations immunity to ...
6 months ago Cybersecuritynews.com
How to Overcome the Most Common Challenges with Threat Intelligence - Today's typical approach to threat intelligence isn't putting organizations in a place to do that. Instead, many threat intelligence tools are delivering too much uncurated and irrelevant information that arrives too late to act upon. Organizations ...
10 months ago Cyberdefensemagazine.com
Buzzing on Christmas Eve: Trigona Ransomware in 3 Hours - In late December 2022, we observed threat actors exploiting a publicly exposed Remote Desktop Protocol host, leading to data exfiltration and the deployment of Trigona ransomware. On Christmas Eve, within just three hours of gaining initial access, ...
9 months ago Thedfirreport.com
IONIX ​​Completes $42M Financing Round to Expand Threat Exposure Management Across the Entire Attack Surface - PRESS RELEASE. TEL AVIV, Israel-(BUSINESS WIRE)- IONIX, a leader in Attack Surface Management, today announced it has completed its $42 million A Round financing by securing $15 million in additional funding from new investors Maor Investments along ...
9 months ago Darkreading.com
What Is Threat Modeling? - Threat modeling emerges as a pivotal process in this landscape, offering a structured approach to identify, assess, and address potential security threats. Threat Modeling Adoption and Implementation The successful adoption of threat modeling within ...
10 months ago Feeds.dzone.com
What Is Cyber Threat Hunting? - Cyber threat hunting involves proactively searching for threats on an organization's network that are unknown to traditional cybersecurity solutions. A recent report from Armis found that cyber attack attempts increased by 104% in 2023, underscoring ...
9 months ago Techrepublic.com
Companies Must Strengthen Cyber Defense in Face of Shifting Threat Actor Strategies - Critical for organizations to understand attackers' tactics, techniques, and procedures. The 2023 mid-year cyber threat report card portends an ominous outlook with staggering data including the fact that 332 million cryptojacking attacks were ...
10 months ago Cyberdefensemagazine.com
10 Most Notable Cyber Attacks of 2023 - In recent times, due to rapid advancements in technology, increased connectivity, and sophisticated tactics that threat actors use, cyber attacks are evolving at a rapid pace. The rise of AI and ML technologies enables threat actors to:-. These ...
10 months ago Cybersecuritynews.com
Continuous Threat Exposure Management - This shift towards consolidation paves the way for a powerful new approach: Continuous Threat Exposure Management. Continuous Threat Exposure Management, or CTEM is a proactive security methodology that employs ongoing monitoring, evaluation, and ...
5 months ago Securityboulevard.com
Windows Incident Response: Human Behavior In Digital Forensics, pt III - Digital forensics can provide us insight into a threat actor's sophistication and situational awareness, which can, in turn, help us understand their intent. Observing the threat actor's actions helps us understand not just their intent, but what ...
10 months ago Windowsir.blogspot.com
New Tool Set Found Used Against Organizations in the Middle East, Africa and the US - Unit 42 researchers observed a series of apparently related attacks against organizations in the Middle East, Africa and the U.S. We will discuss a set of tools used in the course of the attacks that reveal clues about the threat actors' activity. We ...
11 months ago Unit42.paloaltonetworks.com
Threat actors actively exploit D-Link DIR-859 router flaw - MUST READ. Threat actors actively exploit D-Link DIR-859 router flaw CVE-2024-0769. Expert released PoC exploit code for Veeam Backup Enterprise Manager flaw CVE-2024-29849. CISA adds D-Link DIR router flaws to its Known Exploited Vulnerabilities ...
4 months ago Securityaffairs.com
Threat actors actively exploit D-Link DIR-859 router flaw - MUST READ. Threat actors actively exploit D-Link DIR-859 router flaw CVE-2024-0769. Expert released PoC exploit code for Veeam Backup Enterprise Manager flaw CVE-2024-29849. CISA adds D-Link DIR router flaws to its Known Exploited Vulnerabilities ...
4 months ago Securityaffairs.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)