{"id":5638,"date":"2016-08-31T18:25:34","date_gmt":"2016-08-31T18:25:34","guid":{"rendered":"http:\/\/prensa.lacnic.net\/news\/2016agoen\/warning-of-computer-fraud-employing-imagery-from-the-olympic-games-2"},"modified":"2023-07-28T18:52:52","modified_gmt":"2023-07-28T18:52:52","slug":"warning-of-computer-fraud-employing-imagery-from-the-olympic-games-2","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/warning-of-computer-fraud-employing-imagery-from-the-olympic-games-2\/","title":{"rendered":"Warning of computer fraud  employing imagery from the Olympic Games"},"content":{"rendered":"<p>The LACNIC Warning Advice and Reporting Point (WARP) recorded increased cyber-attack activity in the region during the 2016 Summer Olympics and has warned about the methods used by cybercriminals taking advantage of the attention attracted by this this competition among the population in general.<\/p>\n<p>Records of Latin American and Caribbean Computer Security Incident Response Teams (CSIRTs) show that during the Olympic Games there was a spike in cyber fraud attempts against financial institutions and attempts were made to breach the International Olympic Committee&#8217;s database. \u201cBrazil and all regional teams were prepared for these incidents. A lot of work had been done in the run-up to the event,\u201d said Graciela Martinez, Head of LACNIC WARP.<\/p>\n<p>Martinez observed that, now that the Games are over, regular Internet users are the ones most at risk, as they may feel inclined to search for information about their favorite athletes or competitors who had outstanding performances in Rio de Janeiro. In this sense, she warned of one type of malicious online activity that is usually detected after these sporting events: fake requests for donations to certain athletes or countries. Users typically receive email requests for donations to athletes or countries, although this is \u201can unusual way of making such requests,\u201d added Martinez. She recommended not opening these email messages, especially if the sender is unknown, as they may contain malware, i.e., malicious software usually designed to steal Internet user credentials.<\/p>\n<p>\u201cThe email may say \u2018Check out this photo of your favorite athlete\u2019, when in fact the file contains malware,\u201d said Martinez. Another common scam are email messages allegedly from athletes who accept sponsorships. Users may receive a link that says \u2018Click here if you&#8217;d like to help XX,\u2019 but in fact attackers ask them to enter their personal data and then use this information to commit fraud.<\/p>\n<p>Lately, one of the most common forms of fraud is ransomware, a type of malicious software that encrypts part or the entire hard drive of the infected system until a ransom is paid.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The LACNIC Warning Advice and Reporting Point (WARP) recorded increased cyber-attack activity in the region during the 2016 Summer Olympics and has warned about the methods used by cybercriminals taking advantage of the attention attracted by this this competition among the population in general. Records of Latin American and Caribbean Computer Security Incident Response Teams [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":21932,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[499],"tags":[1271,471],"archivo":[783,1345],"taxonomy-authors":[],"tipo_autor":[],"class_list":["post-5638","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cibersecurity","tag-warp-en","archivo-august-2016-edition","archivo-editions"],"acf":{"author":"","related_notes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | Warning of computer fraud employing imagery from the Olympic Games<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/warning-of-computer-fraud-employing-imagery-from-the-olympic-games-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | Warning of computer fraud employing imagery from the Olympic Games\" \/>\n<meta property=\"og:description\" content=\"The LACNIC Warning Advice and Reporting Point (WARP) recorded increased cyber-attack activity in the region during the 2016 Summer Olympics and has warned about the methods used by cybercriminals taking advantage of the attention attracted by this this competition among the population in general. Records of Latin American and Caribbean Computer Security Incident Response Teams [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/warning-of-computer-fraud-employing-imagery-from-the-olympic-games-2\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2016-08-31T18:25:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-28T18:52:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2016\/08\/3.png\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/warning-of-computer-fraud-employing-imagery-from-the-olympic-games-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/warning-of-computer-fraud-employing-imagery-from-the-olympic-games-2\/\"},\"author\":{\"name\":\"Gianni\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\"},\"headline\":\"Warning of computer fraud employing imagery from the Olympic Games\",\"datePublished\":\"2016-08-31T18:25:34+00:00\",\"dateModified\":\"2023-07-28T18:52:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/warning-of-computer-fraud-employing-imagery-from-the-olympic-games-2\/\"},\"wordCount\":345,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/warning-of-computer-fraud-employing-imagery-from-the-olympic-games-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2016\/08\/3.png\",\"keywords\":[\"Cibersecurity\",\"WARP\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/warning-of-computer-fraud-employing-imagery-from-the-olympic-games-2\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/warning-of-computer-fraud-employing-imagery-from-the-olympic-games-2\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/warning-of-computer-fraud-employing-imagery-from-the-olympic-games-2\/\",\"name\":\"LACNIC Blog | Warning of computer fraud employing imagery from the Olympic Games\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/warning-of-computer-fraud-employing-imagery-from-the-olympic-games-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/warning-of-computer-fraud-employing-imagery-from-the-olympic-games-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2016\/08\/3.png\",\"datePublished\":\"2016-08-31T18:25:34+00:00\",\"dateModified\":\"2023-07-28T18:52:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/warning-of-computer-fraud-employing-imagery-from-the-olympic-games-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/warning-of-computer-fraud-employing-imagery-from-the-olympic-games-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/warning-of-computer-fraud-employing-imagery-from-the-olympic-games-2\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2016\/08\/3.png\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2016\/08\/3.png\",\"width\":\"680\",\"height\":\"300\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/warning-of-computer-fraud-employing-imagery-from-the-olympic-games-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Warning of computer fraud employing imagery from the Olympic Games\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\",\"name\":\"Gianni\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/gianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | Warning of computer fraud employing imagery from the Olympic Games","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/warning-of-computer-fraud-employing-imagery-from-the-olympic-games-2\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | Warning of computer fraud employing imagery from the Olympic Games","og_description":"The LACNIC Warning Advice and Reporting Point (WARP) recorded increased cyber-attack activity in the region during the 2016 Summer Olympics and has warned about the methods used by cybercriminals taking advantage of the attention attracted by this this competition among the population in general. Records of Latin American and Caribbean Computer Security Incident Response Teams [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/warning-of-computer-fraud-employing-imagery-from-the-olympic-games-2\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2016-08-31T18:25:34+00:00","article_modified_time":"2023-07-28T18:52:52+00:00","og_image":[{"width":680,"height":300,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2016\/08\/3.png","type":"image\/png"}],"author":"Gianni","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/warning-of-computer-fraud-employing-imagery-from-the-olympic-games-2\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/warning-of-computer-fraud-employing-imagery-from-the-olympic-games-2\/"},"author":{"name":"Gianni","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab"},"headline":"Warning of computer fraud employing imagery from the Olympic Games","datePublished":"2016-08-31T18:25:34+00:00","dateModified":"2023-07-28T18:52:52+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/warning-of-computer-fraud-employing-imagery-from-the-olympic-games-2\/"},"wordCount":345,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/warning-of-computer-fraud-employing-imagery-from-the-olympic-games-2\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2016\/08\/3.png","keywords":["Cibersecurity","WARP"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/warning-of-computer-fraud-employing-imagery-from-the-olympic-games-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/warning-of-computer-fraud-employing-imagery-from-the-olympic-games-2\/","url":"https:\/\/blog.lacnic.net\/en\/warning-of-computer-fraud-employing-imagery-from-the-olympic-games-2\/","name":"LACNIC Blog | Warning of computer fraud employing imagery from the Olympic Games","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/warning-of-computer-fraud-employing-imagery-from-the-olympic-games-2\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/warning-of-computer-fraud-employing-imagery-from-the-olympic-games-2\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2016\/08\/3.png","datePublished":"2016-08-31T18:25:34+00:00","dateModified":"2023-07-28T18:52:52+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/warning-of-computer-fraud-employing-imagery-from-the-olympic-games-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/warning-of-computer-fraud-employing-imagery-from-the-olympic-games-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/warning-of-computer-fraud-employing-imagery-from-the-olympic-games-2\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2016\/08\/3.png","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2016\/08\/3.png","width":"680","height":"300"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/warning-of-computer-fraud-employing-imagery-from-the-olympic-games-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"Warning of computer fraud employing imagery from the Olympic Games"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab","name":"Gianni","url":"https:\/\/blog.lacnic.net\/en\/author\/gianni\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2016\/08\/3.png","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":5634,"post_title":"Advierten por fraudes inform\u00e1ticos  utilizando im\u00e1genes de Juegos Ol\u00edmpicos","slug":"advierten-por-fraudes-informaticos-utilizando-imagenes-de-juegos-olimpicos","href":"https:\/\/blog.lacnic.net\/advierten-por-fraudes-informaticos-utilizando-imagenes-de-juegos-olimpicos\/"},{"locale":"pt_BR","id":5636,"post_title":"Advert\u00eancia por fraude inform\u00e1tica por meio de imagens dos Jogos Ol\u00edmpicos","slug":"advertencia-por-fraude-informatica-por-meio-de-imagens-dos-jogos-olimpicos-2","href":"https:\/\/blog.lacnic.net\/pt-br\/advertencia-por-fraude-informatica-por-meio-de-imagens-dos-jogos-olimpicos-2\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/5638","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=5638"}],"version-history":[{"count":4,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/5638\/revisions"}],"predecessor-version":[{"id":21931,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/5638\/revisions\/21931"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/21932"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=5638"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=5638"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=5638"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=5638"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=5638"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=5638"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}