From Pirated Software to Full Access to FIFA: Tracing the 2026 World Cup Infostealer Pipeline

April 29, 2026

By Assaf Morag, Cybersecurity Researcher

Imagine that someone searches for a free PDF editor. They click a link on a website that seems legitimate, get bounced through a chain of disposable redirect domains, and download what looks like legitimate software. Buried inside the ZIP file is a hijacked Steam binary that silently loads an infostealer. Within minutes, every credential saved in every browser on that machine, including their FIFA account login, is packaged into a stealer log and traded on Telegram

Multiply that by 130,000 logs containing FIFA-related credentials that Flare identified over a period of one year (April 2025-April 2026), and the scale of the exposure becomes clear. This is the collateral damage of industrialized credential theft, and it creates a growing attack surface as the 2026 World Cup approaches.

About this World Cup Series

The United States, Canada, and Mexico have been selected to host the 2026 FIFA World Cup. As of early April, the lineup of all 48 teams set to compete in the final stage is now complete. 

How are threat actors responding? What’s already emerging across deep and dark web communities?

This blog is part of Flare’s World Cup 2026 Cybercrime Series, a collection of focused research pieces examining the evolving threat landscape surrounding the tournament. The series explores key areas including phishing infrastructure, fraud and scams, illegal streaming services, illicit betting platforms, insider threats, and other cybercriminal activities targeting the 2026 World Cup.

Key Findings About FIFA-Related Credential Exposures

  • Nearly 130,000 infostealer logs containing FIFA-related credentials were identified by Flare, with over 2,500 exposed email/password pairs across the fifa.com and fifa.org domains. This exposure is driven by broad, indiscriminate infostealer infections rather than a targeted campaign against FIFA, meaning the credentials are collateral damage from industrial-scale credential theft that sweeps up everything on an infected machine.
  • Infostealer-driven cybercrime is largely opportunistic. However, the sheer volume of accumulated credentials creates a growing risk as the tournament approaches, giving threat actors a large pool of accounts to sort through for high-value targets such as staff, partners, or vendors with access to internal systems.
  • Flare researchers traced a complete infection chain of a victim with an email with a FIFA domain from a piracy search to credential theft in detail. A victim searching for a free PDF editor was led through a multi-stage redirect chain using disposable .cfd domains, landed on a fake download page impersonating Google Drive, and downloaded a ZIP file containing a HijackLoader (Rugmi) infection delivered via DLL side-loading of a legitimate Steam binary, with the final payload almost certainly being Lumma Stealer.
  • Compromised FIFA credentials carry risk well beyond individual account takeover. Attackers with access to staff or partner credentials can potentially reach internal systems, CRM platforms, or ticketing backends, enabling manipulation of ticket inventories, phishing campaigns targeting fans, or lateral movement into cloud platforms and operational infrastructure tied to the tournament. A single compromised endpoint becomes a scalable attack surface with both financial and operational impact.
Credential & Infostealer Monitoring

Detect Exposed Credentials Before They’re Weaponized

Flare continuously scans underground forums, marketplaces, Telegram channels, and combolists to identify compromised accounts tied to your corporate domains, enabling immediate remediation before credentials are traded, reused, or leveraged for lateral movement.

Real-time stealer log and credential exposure alerts
Context on how credentials are traded and weaponized

Organizational Credential Exposure

Whether conducting a threat intelligence review or a penetration test, the first step is discovery. We scoped our analysis to two domains owned and controlled by FIFA since 1995: “@fifa.com” and “@fifa.org”. These domains are owned and controlled by FIFA since 1995 and registered via CSC Corporate Domains, Inc. FIFA uses these domains internally to host the official website and to create email accounts for employees, contractors, and partners.

We utilized Flare’s Credential Browser feature to discover exposed assets (primarily email addresses and associated passwords) linked to these domains.

Compromised FIFA Credentials Since the 2022 World Cup

Compromised FIFA Credentials Since the 2022 World Cup

The sources of these credentials are primarily third-party breaches and combolists. These are uploaded to various underground forums and messaging groups, where they are shared or traded to facilitate cybercrime.

Exposure Summary

For fifa.com, we found a total of 1,184 sets of email/username and password in Flare. 

Flare’s Credential Browser search feature showing exposed credentials

For fifa.org, we found a total of 1,329 sets of email/username and password in Flare.

Flare’s Credential Browser search feature showing exposed credentials

What Can Attackers Do With FIFA-Related Stealer Logs?

Stealer logs containing credentials and session data from users of FIFA-related platforms (such as fifa.com or fifa.org) can be extremely valuable to attackers. 

This risk escalates across several dimensions:

  • Direct account access: With access to authenticated sessions, attackers can bypass login protections and directly access user accounts, enabling activities like ticket theft or resale fraud ahead of high-demand events like the World Cup. 
  • Internal system compromise: If any compromised credentials belong to staff, partners, or vendors, attackers may gain access to internal systems, CRM platforms, or ticketing backends. This opens the door to broader data exposure, manipulation of ticket inventories, or unauthorized access to operational systems. Thus, identifying “higher tier” FIFA credentials is a key priority for threat actors ahead of major events.
  • Lateral movement: Attackers can reuse credentials across services (SSO, email, cloud platforms) to pivot deeper into organizational environments, potentially reaching sensitive data such as financial records, event logistics, or security plans. In the context of a global event, this could escalate into targeted disruption, tampering with ticket distribution, launching phishing campaigns against fans, or even interfering with event infrastructure. 

Ultimately, infostealer data turns a single compromised endpoint into a scalable attack surface with both financial and operational impact.

Analyzing the Infostealer Data

Infostealers have become one of the most dominant and scalable threats in modern cybercrime.

Malware families like RedLine Stealer, LummaC2, and Vidar quietly harvest credentials, session cookies, autofill data, crypto wallets, and system fingerprints from infected machines, then exfiltrate them into structured logs that are traded across underground marketplaces and Telegram channels. 

A single infection can expose dozens of corporate and personal accounts, while millions of such logs are continuously recycled, resold, and weaponized by initial access brokers and threat actors. Infostealers effectively collapse the boundary between home and enterprise environments, turning compromised endpoints into entry points for ransomware and data breaches.

When leveraging Flare to analyze infostealer activity over the past year, we identified nearly 130,000 logs containing at least one record associated with the domains fifa.com or fifa.org. 

The infection trend remains relatively consistent over time, reinforcing a key insight: infostealer-driven cybercrime is largely opportunistic rather than campaign-specific. In other words, despite the heightened global attention surrounding FIFA and the 2026 World Cup, there is no clear indication of a targeted or coordinated campaign specifically aimed at FIFA users. Rather, these credentials are swept up as part of broad, indiscriminate infections at scale.

Searching for FIFA related stealer logs with Flare

Infostealer Family Distribution

We extracted a convenience sample via Flare’s API: the past 10 days for the fifa.com domain (727 distinct users) and a 60-day query for the fifa.org domain (10 distinct users). As expected, Lumma and Vidar infostealers dominate the dataset, consistent with their current market position.

Infostealer Families Distribution – FIFA Credentials

Infostealer Families Distribution
of FIFA Credentials

Vidar 67%
Lumma 24%
StealC 5%
RedLine 3%
Nexus 1%
Aurora 1%

Infostealer families distribution in our dataset

What Infostealers Collect

The infostealer data indexed on Flare contains detailed information about each infected machine.

Data about an infostealer infected machine (Flare link to post, sign up for the free trial to access if you aren’t already a customer)

Infostealer infected machine files

  • Autofill data: Everything from the browser’s autofill database, including credit cards, emails, passwords, logins, and other form data the browser automatically completes.
  • Cookies: Session data stored by websites to enable persistent access. Whoever holds this data can access the websites the victim is currently logged into.
  • Google Accounts: Account information associated with the victim’s Google profile.
  • Browsing history: Full history, including URLs that may contain login details (e.g., https://user:[email protected]).
  • Software tokens: Authentication and password information for desktop applications such as WhatsApp, Discord, and Telegram.
  • Parsed aggregated lists: Extracted domains, credentials, and unique passwords organized for easy consumption by other threat actors.

Tracing a Real Victim’s Infection Sequence

The data Flare collects includes information about the malicious file’s execution path, which reveals how the victim was infected. Therefore, we can further learn about the malware. We analyzed our dataset and found that the majority of samples ran on Windows machines. We selected a recent, illustrative example to retrace the infection sequence:

C:\Users\<<Reducted>>\Downloads\pdf-xchange_editor_plus_(2026)_full_español_[mega].exe

Step 1: The Search

The victim searched for a free version of PDF-XChange Editor Plus.

All of the top results led to malicious downloads. Each linked to a stolen or cracked software sharing website. Most of these sites are not legal, as they offer paid software like PDF-XChange Editor Plus for free (indicating cracked or modified versions). Site names like “artistapirata” openly advertise piracy.

The page of an illegal download link for the cracked software

Clicking the download link triggered a chain of intermediate redirects: 

The first redirect was: https[:]//href.li/?https[:]//wikifilhost78.it[.]com/?data=…

This URL uses a public redirector (href.li) combined with a fake file-hosting domain and includes embedded PHP code that generates random values per request, likely to evade detection and complicate tracking.

This was the second redirect: https[:]//getcdn82[.]host93s[.]cfd/?tag=u7tY5vH4

This page acts as a disposable “Downloading…” redirector, using multiple forced redirection methods to immediately forward users to another dynamically generated .cfd domain. This type of behavior is commonly observed in staged malware or phishing delivery chains.

The third redirect was: https[:]//generate907a38[.]host93s[.]cfd/?data=…

Another lightweight redirector forcing navigation to a dynamically generated domain with encoded parameters, reinforcing the pattern of multi-stage obfuscation used to conceal the true payload.

Both domains on this redirection chain were recently registered, indicating that the infrastructure is highly maintained and volatile. 

The operational cycle works as follows: piracy advertisements point to a highly configurable redirect link. As URLs are flagged as malicious over time, newly registered domains replace the burned ones. New victims click the piracy ads, get redirected and infected, the links are eventually reported, and the cycle repeats.

Below you can see that even though this domain is fairly new, it’s already flagged in VirusTotal as malicious with a phishing related connection.

VirusTotal detections for the domain cloud01y.cfd

The backend dynamically generates a new random subdomain for each request to serve the malware.

VirusTotal’s (partial) list of sub-domains for our domain

The newly registered domains were:

Whois host93s.cfd registration details

Whois cloud01y.cfd registration details

The .cfd domain is cheap and relatively new, with no established trust. Because it is easy to register and disposable, it is frequently used for short-lived or low-reputation websites. While not all .cfd sites are malicious, they generally carry higher risk compared to established domains.

It is possible that the domain cloud01y is a domain lookalike of the name Cloudly, which bundles several legitimate software companies and an open source project.

Step 3: The Fake Download Page

Below is the final page in the redirect page, which leads to a file download. 

The download site

The final page in the redirect chain presents a fake download interface designed to look like a legitimate cloud storage service (“GDrive”). The actual download link is hidden in the code (data-url=”https[:]//edge2[.]filehost74[.]sbs/…”), while the visible page shows generic trust signals like “Malware Scanned” and “Secure Transfer” that are not backed by any real functionality. The “Copy Link” button is misleading, as it triggers the same download flow instead of copying anything. These pages rotate logos and names of popular file-sharing services such as Google Drive and Dropbox.

The page also includes basic anti-analysis behavior. A script continuously checks whether developer tools are open and, if detected, clears the page content (document.documentElement.innerHTML = ”), which explains why everything disappears during inspection. Additional protections (disabling right-click and text selection) further suggest the page is designed to prevent analysis rather than improve the user experience.

Step 4: The Payload

We downloaded and extracted the compressed .zip file.

The .zip file inflated directory tree

We analyzed all the files in the inflated directory. Most of them were benign. But, we did find a HijackLoader (also known as Rugmi or IDAT Loader) infection chain delivered via the fake pirated software lure.

The attack uses DLL search-order hijacking: a legitimate, code-signed Valve Steam binary is renamed and bundled alongside a trojanized SDL3.dll that implements the HijackLoader malware. 

When the victim executes the fake Steam binary, Windows automatically loads the malicious SDL3.dll from the same directory. The loader reads an encrypted PE payload from a disguised configuration file (mesh.conf) using a 1,002-byte key from asset32.tmp, decrypts it in memory, and reflectively executes the second stage. Based on the delivery context and behavioral indicators, the final payload is most likely Lumma Stealer.

Two of the five files received AV detections on VirusTotal (Rising AV):

FileMD5Detection
SDL3.dll9af16f9fc35ce00688c20318e868664aDownloader.Rugmi/x64!1.134BF
mesh.conf9eecf800853672a56fc46d26b6fa5bb1Trojan.HijackLoader!1.12810 

The same loader is tracked in the media under 3 different names: IDAT Loader, HijackLoader, and Rugmi. It is a private loader sold on underground cybercrime forums. Different threat actors purchase access and configure their own payload and C2.

Intelligence on Rugmi loader from Flare (Flare link to post, sign up for the free trial to access if you aren’t already a customer)

In this case, the distribution vector was a fake pirated software forum. Other common distribution methods for this loader include:

  • Fake pirated software / game cracks on torrent sites and warez forums
  • Malvertising via Google or Bing ads for cracked software
  • Fake YouTube tutorials with malicious download links in descriptions
  • Telegram channels distributing “free” game cheats and mods
  • ClickFix attacks, a social engineering attack where a fake error or CAPTCHA tricks users into running commands on their own device, effectively executing malware themselves (it bypasses traditional defenses by relying on user actions instead of exploiting software vulnerabilities)

Below is the infection chain:

The infostealer’s infection chain

MITRE ATT&CK Mapping

MITRE ATT&CK Techniques – Lumma Stealer Infection Chain
Technique ID Description
Supply Chain Compromise: Compromise Software Supply Chain T1195.002 There is correlation to Phishing, Drive-by-Compromise, and SSC. This is a website that offers cracked software, and introduces malware in the cracked illegal software.
User Execution: Malicious File T1204.002 Victim runs GgPIgyXGx.exe
DLL Side-Loading T1574.002 SDL3.dll loaded by legitimate Steam binary from same directory
Obfuscated Files: Steganography T1027.003 Second-stage PE hidden inside PNG IDAT chunks in mesh.conf
Obfuscated Files: Encoding T1027 Text-scrambled key (asset32.tmp) and C2 config (mesh.conf header)
Reflective Code Loading T1620 In-memory PE loading — no disk write of decrypted payload
Masquerading T1036 steam.exe renamed to random filename GgPIgyXGx.exe
Indicator Removal T1070 No registry persistence; payload never written to disk
Obfuscated Files: API Hashing T1027.007 GetProcAddress-by-hash, custom seed 0x0BB7A699
Credentials from Web Browsers T1555.003 Expected Lumma Stealer target (browser password stores)
Clipboard Data T1115 Typical Lumma Stealer collection target
Exfiltration over C2 Channel T1041 Stealer exfiltrates via C2 encoded in mesh.conf config header

Taking the Infostealer Malware Seriously with Proactive Visibility 

Flare’s analysis reveals consistent and largely opportunistic exposure of credentials linked to FIFA domains, driven primarily by widespread infostealer infections rather than a coordinated, targeted campaign. However, this should not be mistaken for low risk. 

The aggregation of hundreds of credentials and nearly 130,000 infostealer logs (from a period of 10 days) creates a fertile ground for threat actors to identify high-value accounts, reuse access across services, and potentially pivot into sensitive environments.

As the World Cup approaches, the risk is not just in an isolated account compromise but in the compounding effect of scale, where stolen credentials, session tokens, and device data can be weaponized for fraud, phishing, lateral movement, and even disruption of event-related operations. 

In a landscape where personal and organizational identities are deeply intertwined, infostealers transform everyday infections into strategic footholds. For organizations involved in global events like FIFA, proactive visibility into exposed assets is no longer optional. It is a critical layer of defense.

Credential & Infostealer Monitoring

Detect Exposed Credentials Before They’re Weaponized

Flare continuously scans underground forums, marketplaces, Telegram channels, and combolists to identify compromised accounts tied to your corporate domains, enabling immediate remediation before credentials are traded, reused, or leveraged for lateral movement.

Real-time stealer log and credential exposure alerts
Context on how credentials are traded and weaponized
Share article

Related Content

View All
05.07.2026

PamDOORa: Analyzing a New Linux PAM-Based Backdoor for Sale on the Dark Web

05.06.2026

Downloading Danger: How World Cup Hype Fuels a Global Mobile Malware Ecosystem

05.04.2026

Monitoring Cyberattacks Directly Linked to the US-Israel-Iran Military Conflict