Cyber Threats to the FIFA World Cup Qatar 2022
Digital Shadows
NOVEMBER 10, 2022
Threat actors can develop fake mobile apps to install adware, steal PII and financial data, extract cookies and credentials, and download further payloads (such as spyware) from a remote-controlled domain. As you can see in the example below, in 2014 some threat actors preferred internet relay chats (IRCs) to organize DDoS attacks.
Let's personalize your content