Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
  • Home
  • Security Week
  • March Madness Requires Vigilance on Both an Individual and Corporate Level
  • Security Week

March Madness Requires Vigilance on Both an Individual and Corporate Level

Marc Solomon March 19, 2025
0

With the Super Bowl and NBA All-Star weekend behind us this means March Madness is nearly upon us. I’m sure most of us know about March Madness, which is the nickname for the National Collegiate Athletic Association’s (NCAA) Division I men’s and women’s college basketball tournaments.

Emotions run high around this tournament, as millions of people across America fill out March Madness “brackets” with the hope of predicting the Final Four as 67 games are played over a 3-week period in March and April. I’m a life-long March Madness fan and I absolutely understand the excitement it generates. I even did my college Honors paper on inter-collegiate athletics (men’s football and basketball), how their teams performed, how far they got in tournaments and how that correlated with alumni contributions to the school. I won’t bore you with the findings here, but you won’t be surprised that money flowed in based on results relative to expectations; such is the very personal connection that sporting success generates.   

Why March Madness ticket sales are targeted 

However, fast forward to the present day and what we find is that, like many other major sporting events, the excitement and enormous interest doesn’t just stop with fans and businesses, but it is also on the radar of many threat actors. Ticket sales for these games represent prime pickings and provide the perfect opportunity for adversaries because they are:

  • High value – Tickets are expensive, and it is not unusual for fans to buy groups of tickets to go to events together.  Therefore, it doesn’t raise suspicion when a high-dollar figure purchase is made by a threat actor.
  • Controlled through official channels – Meaning fans who don’t want to purchase the ‘Official Ticketmaster NCAA Experience Package” are incentivised to look elsewhere for tickets, which gives fraudsters the perfect opportunity for scams.
  • Time-critical – Fans rush to buy tickets last-minute as teams go through to the next round. This urgency creates chaos and makes it easier for adversaries to hide in plain sight.
  • An emotional purchase – As already mentioned, emotions run high, meaning that some of the standard security protocols and learnings about security go out the window in the rush to get many sought-after tickets.

All the above means that pressure on security teams intensifies as they struggle to keep pace, especially when so many purchases happen in a flood once the brackets are set and then when results are known.

Attacks are becoming more sophisticated

Defending the Super Bowl and other high profile sporting events from adversarial attacks that potentially include weaponized AI, endpoint attacks, deepfakes, and finely tuned social engineering skills requires a mix of experienced capabilities and a solid threat intelligence program. Just taking Super Bowl Sunday as an example, this saw a 57% rise in malicious gambling and betting content. There was also a 15% increase in illegal streaming and torrenting traffic related to fake streaming sites during the championship weekend compared to the previous average held between May and December, indicating an escalating risk of security issues tied to these big events.

Another example is the Paris 2024 Olympics and Paralympics. The SOC team recognized how important it is to really understand the threat landscape and what you can expect in terms of threats and attacks. There will of course be some known paths for hackers to exploit, but there will also be areas that are unknown or unexpected and this is where collective knowledge sharing is so important.

To understand potential attack paths, the Olympic SOC team looked at past games to identify who attacked these events and how they did it. Once this analysis had been undertaken, the priority was to determine how the cybersecurity posture and approach might be adapted given this context. This is where arming the team with actionable insights is so important. This includes trying to understand the modus operandi (MO) of the threat actors: who is trying to attack you, do you know their last movements, what facts can you arm the SOC team with to protect against these sorts of attacks?

Advertisement. Scroll to continue reading.

Working as a collective

I can’t emphasise enough the importance of sharing this threat intelligence and letting others know what you have found, working as a collective to share intelligence between specific companies. The timings of attacks, and methods, and which part of the tournament do hackers and fraudsters attack most?  It wouldn’t be unreasonable to think that the Final Four is where efforts are targeted, but threat actors and fraudsters don’t attend the matches, they are in it for maximum monetizable ROI, and this starts right from the earliest games where there are many more excited – and therefore vulnerable – fans to target.  Only by sharing intelligence will we uncover their techniques, tactics, motivations and more. This is one of the reasons why we set up our ThreatQ Community, which now boasts more than 500 experienced cyber security professionals sharing intel to level up threat detection and response.

It is important to not only be open-minded about where an attack might happen but to also remember there is an individual aspect to this tournament as well as a business aspect. Individuals desperate to get tickets and support their teams might be accessing questionable sites via their corporate devices, potentially exposing the business to malicious activities. 

As well as being alert and proactive before and during major events, it is equally important to undertake a thorough post-event analysis and assimilate the lessons learned, looking back with a critical eye on what happened.  What were the trends?  What types of attacks did fans, businesses and ticketing companies face? 

Be vigilant

It’s hard to recognize some of the risks and scams out there, threat actors are so innovative and creative about increasing their reach and refining the techniques they utilize for attacks. My advice is to be vigilant. Of course, ticketing companies need to be extra thorough during this time, but I would say that we all have a duty as individuals to tell our family and friends if we experience an attack or any form of scam. The more widely we spread the word, the better armed we will all be to recognize that what, on the face of it, looks like a great deal is too good to be true. And remember you can’t afford to be complacent because I guarantee the cybercriminals will be ready to take advantage during March Madness.

About The Author

Marc Solomon

See author's posts

Original post here

Continue Reading

Previous: Infosys to Pay $17.5 Million in Settlement Over 2023 Data Breach
Next: Hackers Exploit Severe PHP Flaw to Deploy Quasar RAT and XMRig Miners

Trending Now

300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide ransomware.jpg 1

300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide

May 23, 2025
SafeLine WAF: Open Source Web Application Firewall with Zero-Day Detection and Bot Protection safeline.jpg 2

SafeLine WAF: Open Source Web Application Firewall with Zero-Day Detection and Bot Protection

May 23, 2025
U.S. Dismantles DanaBot Malware Network, Charges 16 in $50M Global Cybercrime Operation botnet.jpg 3

U.S. Dismantles DanaBot Malware Network, Charges 16 in $50M Global Cybercrime Operation

May 23, 2025
CISA Warns of Suspected Broader SaaS Attacks Exploiting App Secrets and Cloud Misconfigs saas.jpg 4

CISA Warns of Suspected Broader SaaS Attacks Exploiting App Secrets and Cloud Misconfigs

May 23, 2025
GitLab Duo Vulnerability Enabled Attackers to Hijack AI Responses with Hidden Prompts prompt.jpg 5

GitLab Duo Vulnerability Enabled Attackers to Hijack AI Responses with Hidden Prompts

May 23, 2025
Oops: DanaBot Malware Devs Infected Their Own PCs Oops: DanaBot Malware Devs Infected Their Own PCs 6

Oops: DanaBot Malware Devs Infected Their Own PCs

May 22, 2025

Related Stories

Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Insurance Firm Lemonade Says API Glitch Exposed Some Driver’s License Numbers

Ionut Arghire April 15, 2025 0
ransomware.jpeg
  • Security Week

Kidney Dialysis Services Provider DaVita Hit by Ransomware

Ionut Arghire April 15, 2025 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Conduent Says Names, Social Security Numbers Stolen in Cyberattack

Ionut Arghire April 15, 2025 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

2.6 Million Impacted by Landmark Admin, Young Consulting Data Breaches

Ionut Arghire April 15, 2025 0
VC-Funding_China-tech.jpg
  • Security Week

China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games

Associated Press April 15, 2025 0
Satellite-Link-Cybersecurity.jpg
  • Security Week

Blockchain, Quantum, and IoT Firms Unite to Secure Satellite Communications Against Quantum Threats

Kevin Townsend April 15, 2025 0

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide ransomware.jpg 1
  • The Hacker News

300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide

May 23, 2025
SafeLine WAF: Open Source Web Application Firewall with Zero-Day Detection and Bot Protection safeline.jpg 2
  • The Hacker News

SafeLine WAF: Open Source Web Application Firewall with Zero-Day Detection and Bot Protection

May 23, 2025
U.S. Dismantles DanaBot Malware Network, Charges 16 in $50M Global Cybercrime Operation botnet.jpg 3
  • The Hacker News

U.S. Dismantles DanaBot Malware Network, Charges 16 in $50M Global Cybercrime Operation

May 23, 2025
CISA Warns of Suspected Broader SaaS Attacks Exploiting App Secrets and Cloud Misconfigs saas.jpg 4
  • The Hacker News

CISA Warns of Suspected Broader SaaS Attacks Exploiting App Secrets and Cloud Misconfigs

May 23, 2025
GitLab Duo Vulnerability Enabled Attackers to Hijack AI Responses with Hidden Prompts prompt.jpg 5
  • The Hacker News

GitLab Duo Vulnerability Enabled Attackers to Hijack AI Responses with Hidden Prompts

May 23, 2025
Oops: DanaBot Malware Devs Infected Their Own PCs Oops: DanaBot Malware Devs Infected Their Own PCs 6
  • Uncategorized

Oops: DanaBot Malware Devs Infected Their Own PCs

May 22, 2025
Oops: DanaBot Malware Devs Infected Their Own PCs danabot.png 7
  • Krebs On Security

Oops: DanaBot Malware Devs Infected Their Own PCs

May 22, 2025

You may have missed

ransomware.jpg
  • The Hacker News

300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide

[email protected] The Hacker News May 23, 2025 0
safeline.jpg
  • The Hacker News

SafeLine WAF: Open Source Web Application Firewall with Zero-Day Detection and Bot Protection

[email protected] The Hacker News May 23, 2025 0
botnet.jpg
  • The Hacker News

U.S. Dismantles DanaBot Malware Network, Charges 16 in $50M Global Cybercrime Operation

[email protected] The Hacker News May 23, 2025 0
saas.jpg
  • The Hacker News

CISA Warns of Suspected Broader SaaS Attacks Exploiting App Secrets and Cloud Misconfigs

[email protected] The Hacker News May 23, 2025 0
Copyright © 2025 All rights reserved. | MoreNews by AF themes.