Cybersecurity researchers from PreCrime Labs (BforeAI) uncovered a large-scale, premeditated cyber campaign targeting the 2025 FIFA Club World Cup and 2026 FIFA World Cup, involving 498 malicious domains registered to exploit fan excitement. Threat actors employed long-term domain aging (some registered as early as 2023 for 2030/2034 tournaments), typosquatting (e.g., *fifaworldcupstadiucom*), and multilingual phishing (Mandarin sites for crypto scams and fake streaming). The attack vectors included: - 56 counterfeit merchandise stores defrauding fans. - 55 fake streaming platforms stealing credentials/payments under the guise of free match access. - 32 unregulated betting sites siphoning funds. - Fraudulent FIFA Coin ICOs, falsely claiming $18M staked to lure investments. - Credential phishing via domains like *fifaworldcup-login[.]com*, harvesting user data. - Geotargeted scams (e.g., *fifawcdallas[.]com*) exploiting U.S. host cities. - Influence operations disguised as social activism to manipulate fans into financial fraud. The campaign leveraged disposable infrastructure (cheap TLDs like *.xyz, *.shop*) and registrars like GoDaddy/Namecheap to evade detection. While no direct data breach of FIFA’s systems was confirmed, the operation eroded trust in official channels, risked financial losses for fans (via scams, fake merchandise, and betting fraud), and damaged FIFA’s reputation ahead of major tournaments. The sophisticated social engineering and global scale suggest potential for escalation into larger financial or reputational harm if unchecked.
Source: https://cyberpress.org/2026-fifa-world-cup-cyber-attack/
TPRM report: https://www.rankiteo.com/company/bforeai
"id": "bfo808090225",
"linkid": "bforeai",
"type": "Cyber Attack",
"date": "6/2023",
"severity": "60",
"impact": "2",
"explanation": "Attack limited on finance or reputation"
{'affected_entities': [{'customers_affected': ['FIFA fans',
'tournament attendees',
'online shoppers',
'cryptocurrency investors'],
'industry': 'sports/entertainment',
'location': 'global (targeting U.S. host cities: '
'Dallas, Atlanta, Kansas City, '
'Philadelphia)',
'name': 'FIFA (Fédération Internationale de Football '
'Association)',
'type': 'sports governing body'},
{'location': ['United States (host cities)',
'Asia (Mandarin-targeted scams)',
'global'],
'name': 'Fans and Travelers (2026 World Cup)',
'type': 'general public'}],
'attack_vector': ['malicious domain registration (498 domains)',
"typosquatting (e.g., 'fifaworldcupstadiucom')",
"credential phishing (e.g., 'fifaworldcup-login[.]com')",
'fake merchandise stores (56 domains)',
'fake streaming platforms (55 domains)',
'betting sites in regulatory gray areas (32 domains)',
"fake ICO ('FIFA coin' scam)",
'multilingual threats (Mandarin sites)',
'fake business directories (EV charging stations)',
'influence operations (social activism criticism)'],
'customer_advisories': ['Avoid unofficial FIFA domains',
'verify URLs for typos',
'use official ticketing/streaming platforms',
'ignore unsolicited ICO offers'],
'data_breach': {'personally_identifiable_information': ['usernames',
'passwords',
'potential email '
'addresses',
'wallet IDs (ICO '
'scam)'],
'sensitivity_of_data': 'high (financial, identity)',
'type_of_data_compromised': ['credentials (phishing)',
'potentially PII (fake '
'registrations)',
'payment data (fake '
'ICO/betting)']},
'description': 'Cybersecurity researchers at PreCrime Labs (BforeAI) '
'uncovered a campaign where threat actors registered 498 '
'malicious domains exploiting FIFA-related brand terms (2025 '
'Club World Cup, 2026 World Cup, and future tournaments up to '
'2034). The domains employ long-term aging strategies, '
'typosquatting, credential phishing, fake '
'merchandise/streaming/betting sites, and multilingual scams '
'(e.g., Mandarin ICO fraud). Attackers used registrars like '
'GoDaddy, Namecheap, and Gname, with .com (58.9%) and low-cost '
'TLDs (.online, .xyz) dominating. Geographic targeting '
'included U.S. host cities (e.g., Dallas, Atlanta), blending '
'legitimate content with malicious intent.',
'impact': {'brand_reputation_impact': ['potential erosion of trust in FIFA '
'digital channels',
'risk of fan disillusionment'],
'data_compromised': ['user credentials (phishing)',
'potential PII from fake registrations'],
'identity_theft_risk': 'high (via phishing)',
'payment_information_risk': 'high (via fake ICO/betting sites)'},
'initial_access_broker': {'entry_point': ['malicious domain registration',
'typosquatting',
'phishing links'],
'high_value_targets': ['FIFA fans',
'cryptocurrency investors',
'tournament travelers'],
'reconnaissance_period': 'up to 2 years (domains '
'registered as early as '
'2023 for 2025/2026 '
'events)'},
'investigation_status': 'ongoing (threat intelligence gathering)',
'lessons_learned': ['Threat actors exploit long-term event hype (domains '
'registered years in advance).',
'Multilingual and geographically targeted scams increase '
'success rates.',
'Low-cost TLDs (.online, .xyz) enable disposable '
'infrastructure.',
'Typosquatting and brand impersonation remain effective.',
'Blending legitimate content with malicious intent '
'complicates detection.'],
'motivation': ['financial gain',
'data harvesting',
'fraud',
'cryptocurrency scams',
'disinformation'],
'post_incident_analysis': {'corrective_actions': ['Develop event-specific '
'threat intelligence '
'frameworks.',
'Strengthen registrar '
'partnerships to disrupt '
'malicious registrations.',
'Launch public awareness '
'campaigns ahead of major '
'tournaments.',
'Enhance technical controls '
'(e.g., DNS filtering for '
'known malicious '
'patterns).'],
'root_causes': ['Lack of proactive domain '
'monitoring for event-based '
'threats.',
'Exploitation of public excitement '
'around global events.',
'Gaps in registrar oversight for '
'bulk suspicious registrations.',
'Effective use of social '
'engineering across '
'languages/cultures.']},
'recommendations': ['Implement pattern-based domain detection for '
"event-related keywords (e.g., 'FIFA2026 + city').",
'Monitor registrar activity for bulk domain registrations '
'tied to major events.',
'Educate users on official FIFA digital channels and red '
'flags (e.g., typos, unsolicited ICOs).',
'Enhance collaboration with registrars (GoDaddy, '
'Namecheap) to flag suspicious registrations.',
'Deploy multilingual threat intelligence to counter '
'regional scams (e.g., Mandarin sites).',
'Proactively takedown fraudulent domains before they '
'scale.'],
'references': [{'source': 'PreCrime Labs (BforeAI) Research Report'},
{'source': 'Google News / LinkedIn / X (BforeAI '
'announcements)'}],
'response': {'communication_strategy': ['public disclosure via cybersecurity '
'reports',
'media outreach (Google News, '
'LinkedIn, X)'],
'enhanced_monitoring': ['recommended: proactive keyword '
'monitoring (event + city names)',
'pattern-based domain detection'],
'third_party_assistance': ['PreCrime Labs (BforeAI)']},
'stakeholder_advisories': ['FIFA',
'host cities (Dallas, Atlanta, etc.)',
'cybersecurity community',
'fan associations'],
'title': 'Sophisticated Cyber Campaign Targeting FIFA 2025 Club World Cup and '
'2026 World Cup with Malicious Domains',
'type': ['phishing',
'fraud',
'social engineering',
'typosquatting',
'cryptocurrency scam',
'influence operation'],
'vulnerability_exploited': ['human trust in FIFA branding',
'lack of domain registration oversight',
'user typographical errors',
'multilingual social engineering gaps']}