Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Phishing Scams Targeting 2026 World Cup Intensify

Phishing Scams Targeting 2026 World Cup Intensify

Posted on May 23, 2026 By CWS

A sophisticated phishing operation aimed at the 2026 FIFA World Cup has expanded significantly, according to security experts. Initially documented as comprising 79 fake domains, the campaign has now grown to encompass 222 domains across 203 unique IP addresses, almost tripling in size.

Deceptive Tactics and Goals

These cybercriminals have developed realistic imitations of FIFA’s website, including counterfeit ticketing portals and fraudulent login pages. The primary aim is to extract financial information and personal data from football fans eager to participate in the upcoming event.

Flare researchers, sharing their findings with Cyber Security News, revealed the breadth of this operation by analyzing passive DNS records, certificate transparency logs, and WHOIS data. Their investigation uncovered a decentralized fraud network with at least four distinct operator groups all targeting the World Cup.

Ongoing Expansion and Security Alerts

The campaign continues to escalate. By mid-April 2026, 52 new domains were registered, with new ones appearing almost daily. Notably, March 27, March 28, and November 17, 2025, accounted for over a third of the new domain registrations.

As the tournament approaches, the infrastructure supporting these scams keeps expanding. Both security teams and the public are advised to remain vigilant as indications suggest the fraud operations are intensifying.

Detailed Investigation Findings

The original analysis identified 79 domains hosted on 14 IP addresses. This has now increased to 222 domains resolving to 203 unique IPs. Notably, 80.6% of these IPs are behind Cloudflare, which is used to obscure the true server locations.

Five IP addresses were found to host multiple fraudulent domains, with one linked to eight sites. Additionally, Cloudflare has flagged three domains as probable phishing sites, reinforcing the malicious nature of this activity.

GNAME.COM and GoDaddy are the primary registrars, managing 94 and 42 domains respectively. Together, they control 61% of the network’s infrastructure. Experts suggest that reporting abuse in bulk to these registrars is an effective way to dismantle a significant portion of the operation.

Operator Clusters and Future Outlook

The investigation revealed at least four independent operator clusters. Cluster A is the most prominent, with about 86 domains mimicking fifa.com. Cluster B operates under generic names, while Cluster C appears to be China-based, and Cluster D uses a fictitious identity linked to the World Cup.

Each cluster employs similar templates but operates independently, suggesting a shared scam toolkit rather than a single orchestrated group. Detection efforts now need to focus on the campaign level, incorporating template and TLS certificate fingerprinting.

With the World Cup drawing near, the urgency for robust digital security measures has never been higher. Stakeholders are urged to enhance their monitoring strategies to mitigate potential threats.

Cyber Security News Tags:Certificate Transparency, Cloudflare, Cybersecurity, digital security, DNS records, domain registration, FIFA 2026, fraud detection, IP addresses, operator clusters, Phishing, Threat Actors, WHOIS data, World Cup

Post navigation

Previous Post: Hackers Exploit Middle Eastern Telecoms for Cyber Operations
Next Post: Banana RAT Targets Brazilian Financial Sector with NF-e Lures

Related Posts

TrickMo Android Malware Threatens Financial Apps TrickMo Android Malware Threatens Financial Apps Cyber Security News
New Agent-Aware Cloaking Leverages OpenAI ChatGPT Atlas Browser to Deliver Fake Content New Agent-Aware Cloaking Leverages OpenAI ChatGPT Atlas Browser to Deliver Fake Content Cyber Security News
Hackers Exploit Intel Utility for Covert Malware Deployment Hackers Exploit Intel Utility for Covert Malware Deployment Cyber Security News
Lessons From Mongobleed Vulnerability (CVE-2025-14847) That Actively Exploited In The Wild Lessons From Mongobleed Vulnerability (CVE-2025-14847) That Actively Exploited In The Wild Cyber Security News
Remcos RAT C2 Activity Mapped Along with The Ports Used for Communications Remcos RAT C2 Activity Mapped Along with The Ports Used for Communications Cyber Security News
Critical Flowise AI Vulnerability Exploited in Cyber Attacks Critical Flowise AI Vulnerability Exploited in Cyber Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI Model Uncovers 10,000 Critical Software Flaws
  • Critical Nginx Vulnerability Demands Immediate Patching
  • New Vulnerability ‘Underminr’ Masks Malicious Networks
  • Compromised Laravel-Lang Packages Spread Credential Stealer
  • F5 BIG-IP Exploit Enables Network Intrusion via SSH

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI Model Uncovers 10,000 Critical Software Flaws
  • Critical Nginx Vulnerability Demands Immediate Patching
  • New Vulnerability ‘Underminr’ Masks Malicious Networks
  • Compromised Laravel-Lang Packages Spread Credential Stealer
  • F5 BIG-IP Exploit Enables Network Intrusion via SSH

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark