Massive World Cup Consumer Fraud Infrastructure Targets Fans Before Kickoff

April 22, 2026

By Assaf Morag, Cybersecurity Researcher

While hundreds of millions of soccer fans worldwide eagerly await the kickoff of the 2026 FIFA World Cup, threat actors are preparing just as intensely to deploy nefarious fraud schemes against unsuspecting supporters.

We have uncovered a large-scale phishing and consumer fraud infrastructure designed to exploit this global excitement. The operation is already in place, leveraging 75+ lookalike domains to sell fake tickets and merchandise that will never reach their buyers.

About this World Cup Series

As of early April, the lineup of all 48 teams set to compete in the games hosted in the US, Canada, and Mexico are complete. Threat actors have also prepared phishing infrastructure to ensnare unsuspecting fans. 

We expose the infrastructure behind the campaign, including its scope, domains, and associated IPs to raise awareness, protect fans, and support FIFA’s efforts to combat World Cup–related cybercrime.

This blog is part of our World Cup 2026 Cybercrime Series: a collection of focused research pieces examining the evolving threat landscape surrounding the tournament. The series explores key areas including phishing infrastructure, fraud and scams, illegal streaming services, illicit betting platforms, insider threats, and other cybercriminal activities targeting the 2026 World Cup.

Key Findings About World Cup Phishing Infrastructure

  • There’s a coordinated phishing infrastructure of 14 IP addresses hosting 79 typosquatting and lookalike domains impersonating the official FIFA website: The sites replicated legitimate FIFA URL path structures to create a highly convincing phishing experience.
  • All sites are built based on the same templates and show high automation as over half the domains were registered through a single registrar, suggesting a scalable campaign designed to expand as tournament demand intensifies: 45 out of 79 domains were registered to GNAME.COM PTE. LTD., which points to a centrally managed operation rather than independent actors.

The fraudulent sites function as full-ecosystem replicas, not simple phishing pages: HTML and structural elements are copied from the malicious infrastructure, while images and icons are pulled directly from the real FIFA website, blending legitimate and fraudulent content to deceive even attentive users.

Brand Protection & Fraud Detection

Detect Lookalike Domains Before They Reach Your Customers

Flare continuously monitors newly registered domains, typosquatting patterns, and underground activity to detect phishing infrastructure impersonating your brand, enabling early disruption before campaigns scale.

Typosquatting and lookalike domain monitoring
Campaign-level correlation across domains, IPs, and registrars

The Phishing Infrastructure Impersonating the FIFA Website

We identified an infrastructure comprising 14 distinct IP addresses hosting 79 typosquatting and lookalike domains impersonating the official FIFA website.

Typosquatting domains are crafted to closely resemble legitimate domains by introducing subtle modifications (such as character substitutions, omissions, or additions or using numbers instead of letter) that can easily deceive users. The official FIFA domain is https://fifa.com (with https://www.fifa.com redirecting to it). 

Threat actors have registered domains such as vww-fifa[.]com, which combines character substitution (“www” → “vww”) and structural variation (“fifa.com” → “fifa-com”) to mislead even experienced users.

Lookalike domains, by contrast, do not rely on direct string similarity but instead exploit brand association and user expectations. Domains such as fifa[.]sale can convincingly impersonate official services – such as ticketing or merchandise platforms—despite not matching the original domain structure.

Coordinated Phishing Infrastructure Deployment Using FIFA Lookalike Domains

18 16 14 12 10 8 6 4 2 0 Nov 15 Dec 1 Dec 15 Jan 1 Jan 15 Feb 1 Feb 15 Mar 1 Mar 15 Apr 1 Date Domains Registered Initial Spike Dormant Phase Campaign Launch

Below you can observe the registrar used:

Registrar Count
GNAME.COM PTE. LTD.
45
GoDaddy.com, LLC
14
Metaregistrar BV
10
Alibaba Cloud Computing Ltd (HiChina)
6
PT Jagoan Hosting Indonesia
2
GMO Internet Group, Inc. d/b/a Onamae.com
1
Web Commerce Communications Limited
1

A significant portion of the domains were registered through GNAME.COM PTE. LTD., a registrar known for supporting a wide range of payment methods (including cryptocurrency) which may make it attractive to threat actors seeking flexibility and reduced traceability.

When accessing these domains via a browser, users are redirected to paths such as /en/tournaments/mens/worldcup/candamexicousa2026. While not an exact match, this structure closely mimics the legitimate FIFA website, reinforcing the illusion of authenticity.

As shown in the screenshot below, the combination of domain typosquatting and realistic URL paths creates a highly convincing phishing experience that can mislead even attentive users into believing they are interacting with the official site.

Fraudulent World Cup website

Below you can see an option of “Match Schedule.” The HTML and most of the elements are taken from the malicious website, but some (like pictures, icons etc.) are taken from the official FIFA website.

The “Match Schedule” page of the fraudulent website

The FIFA store itself looks exactly like the original one.

Fraudulent FIFA Store page

When clicking on the “FIFA Collect” page, the new tab opens to the real FIFA website.

Fraudulent FIFA Collect page

To further look into the fraudulent FIFA Store, we tried to buy the official original game jersey of the next 2026 World Cup winner.

Screenshot of shirts sold on the fraudulent FIFA Store

After we chose a jersey, we were redirected to a fake FIFA ID login page, which resembles the legitimate FIFA ID login page.

Fake FIFA ID page looks similar to the real version

We were asked to sign in to our FIFA account. So, we entered a fake login, which surprisingly (or not) was immediately accepted.

Fake login entered into the FIFA ID page

This provides additional insight into the nature of the site. While it may function as a phishing portal targeting FIFA accounts for potential account takeover, it does not appear to proxy or relay live data from the legitimate platform, unlike more advanced, real-time phishing kits. Instead, the evidence suggests it primarily operates as a standalone financial fraud site, designed to directly collect payments from victims.

That said, harvesting user credentials remains a valuable secondary objective. Compromised FIFA accounts could be monetized by reselling legitimate match tickets, which often range from several hundred to several thousand dollars.

Following the fake login process, selecting merchandise options (such as shirt size), and completing the purchase flow, we proceeded to add a match ticket (for example, Spain vs. Uruguay) to further analyze the transaction behavior.

Entering in false information for checking out from the fake FIFA Store

As expected, the ticketing page also resembles the real FIFA website.

False FIFA ticketing page

We selected a ticket for a game and clicked to check out.

Selecting a ticket

Below you can see our shopping cart.

Shopping cart includes a jersey and a game ticket

Before being directed to the actual payment methods, the website offers the option to pay with a credit card.

Payment method available includes credit card

However, the next page shows that the actual payment methods available are only through various payment apps and crypto.

The only payment methods available are payment apps and crypto

We wanted to inquire more about that and tried using the chat option, but it was not functional. 

Customer support chat did not actually work

As a comparison, we registered an account with the real FIFA website. The threat actors’ fake websites are pretty similar to the real version. 

Real FIFA website

The FIFA ID login page was copied pretty closely by threat actors for their fake version.

FIFA ID login page

However, here is where the similarities end. The ticket purchasing process is completely different. 

The page prompted choosing a specific stand, sector, block and seat, rather than selecting a ticket for a game (which is what the fake website allowed). The Spain vs. Uruguay tickets were sold out, so we selected a ticket for the Canada vs. Bosnia and Herzegovina game.

Step to choose a game

Step to choose a stand

Step to choose a seat

The payment page allows for the option to pay with a credit card, rather than through various applications or crypto.

Payment page

The 2026 World Cup is not just a global sporting event, but it’s also a prime target for cybercriminal operations at scale.

Five Best Practices on How Fans Can Avoid Getting Scammed

Stay safe during the World Cup and similar high-profile events with these key practices:

1. Verify the Domain Carefully

  • Only use the official domain: https://fifa.com 
  • Watch for subtle changes like:
    • vww-fifa.com 
    • fifa-sale.com 
    • fifa-com.* 
  • Even small differences can indicate a scam 

2. Avoid Clicking on Ads or Social Links

  • Fraudulent sites are often promoted via:
    • Social media 
    • Messaging apps 
    • Sponsored ads 
  • Always navigate manually to trusted websites 

3. Be Suspicious of Payment Methods

  • Official platforms use secure, traceable payment methods (e.g., credit cards) 
  • Red flags include:
    • Crypto payments 
    • Payment apps only 
    • No refund or buyer protection 

4. Validate the Purchase Flow

  • Real ticket platforms:
    • Require seat selection (section, row, seat) 
  • Scam sites:
    • Offer generic tickets without seat details 
    • Allow unrealistic availability (e.g., sold-out matches) 

5. Never Trust Login Pages Blindly

  • If login credentials are accepted instantly (even fake ones) → it’s a scam 
  • Use password managers, as they won’t autofill on fake domains

Threat Actors Increasingly Build Convincing Fraud Architecture

Attackers no longer rely on simple phishing pages; they build entire ecosystems that mimic legitimate platforms, making detection increasingly difficult for end users.

Awareness, verification, and proactive monitoring are critical for fans, and organizations can proactively detect and disrupt fraud infrastructure to protect end users.

Threat Exposure Management

Disrupt Fraud Infrastructure Before It Scales

Flare correlates domains, IPs, registrars, and hosting providers to give your team a campaign-level view of phishing operations, supporting rapid takedowns through actionable intelligence shared with registrars and law enforcement.

Actionable intelligence for domain takedowns
Distinguish credential theft from financial fraud campaigns

Indication of Compromise

Indicators of Compromise 93 IOCs
# Category Value Classification
Share article

Related Content

View All
04.22.2026

Monitoring Cyberattacks Directly Linked to the US-Israel-Iran Military Conflict

04.22.2026

You Won’t Get the Ticket or Your Money Back: Inside the World Cup 2026 Ticket Fraud Operation

04.22.2026

How Phantom Carbon Credits and Identity Wallet Exploitation are Reshaping Global Fraud