April 8, 2019 By David Bisson 2 min read

Online fraudsters are exploiting users’ excitement for March Madness by targeting them with phishing attacks and streaming scams.

Zscaler researchers came across multiple phishing websites after searching Google for free livestreams of March Madness, the colloquial name for the annual NCAA Division I basketball tournament. One such site, streamcartel[.]org, contained adware on each of its pages. Whenever a user clicked anywhere on the page or attempted to close one of the malicious ads, a new tab opened and prompted the user to install a fake browser extension.

The security firm also found malicious activity on sawlive[.]tv. This phishing site used sporting events to attract users into visiting and then bombarded them with malicious ads. One such ad redirected users to a fake Windows security warning page.

Zscaler’s research also turned up several typosquatting domains that used terms associated with the NCAA Tournament to prey upon unsuspecting users. With thousands of people rushing to watch the games online, it’s easy to imagine some fans clicking on malicious links without thinking twice.

Streaming Scams Are Common in March

Given the relatively high success rate of social engineering campaigns, March Madness-themed cyberattacks are unsurprisingly common this time of year.

In March 2017, for example, Zscaler detected attackers using phishing sites that used the popularity of March Madness to target employees with adware. These malicious ads, in turn, tricked users into installing browser hijackers and other potentially unwanted applications. And in 2018, WXYZ reported that Michigan Attorney General Bill Schuette had issued an alert warning users to be on the lookout for scammers pushing fake March Madness tickets.

How to Stop the Madness of Topical Phishing Attacks

Threat actors have a history of creating phishing attacks around topical events such as March Madness. Acknowledging that reality, security professionals should help defend their organizations with ahead-of-threat detection to detect potentially malicious domains before the threats themselves become visible.

Additionally, companies should create a security awareness training program that, among other things, teaches employees about some of the most common types of social media scams and social engineering tactics.

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today