Security

The shadow of hacker attacks and bot fraud on the World Cup

The threat is aimed at It infrastructures and ticket platforms. The solutions: predictive approach with AI and awareness

by Gianni Rusconi

Social. Canali Telegram che offrono in vendita biglietti fraudolenti per Fifa 26

3' min read

Translated by AI
Versione italiana

3' min read

Translated by AI
Versione italiana

From domains aimed at fraud to bots for purchasing tickets to attacks on IT infrastructures: the range of threats hovering over the Fifa World Cup 2026 is vast and hints at the importance of a game that is played far away from the pitch, that of digital security. Several factors, starting with the size of the audience, make the tournament an attractive target for cybercrime and complexly structured malicious campaigns.

The list of identified threats includes a bit of everything, and the alert is at its highest, especially with regard to DDos attacks aimed at blocking broadcasts and phishing actions aimed at fans. That security is one of the facets of this major digital event is also indicated by the thousands of World Cup-related domains registered in the past months, often in an automated manner, to sell non-existent tickets, activate malicious streaming platforms or manage e-commerce of counterfeit merchandise.

Loading...

An organic plan of offence

Not isolated initiatives, therefore, but an organic plan of offence involving the use of a few specific registrars, recurring language patterns and shared Dns infrastructures. All topped off with cross-channel 'promotion' of these fraudulent sites through social campaigns and sponsored ads on Telegram and the dark web. Kaspersky and Check Point experts have identified different types of scams that imitate official event sources (even replicating their official colours) or exploit their popularity for malicious purposes. A further attack scenario involves fraudulent e-mail campaigns, through which attackers try to induce users to send money or click on a phishing link; in some cases, the scam message contains a false claim to win $500,000 worth of tickets, flights and accommodation, followed by instructions to contact the sender to claim the 'prize'.

Ticketing platforms at risk

If fan scams are one side of the problem, the other reflects more sophisticated threats to active IT systems operating behind the scenes of the event, e.g. official ticketing platforms, which have already been targeted by botnets designed to saturate virtual queues and acquire large volumes of tickets. On the infrastructural front, the massive use of streaming services and mobile apps to ensure real-time coverage of the entire event inexorably widens the attack surface and also exposes security and logistics coordination systems to breaches. The distributed model of the tournament, spread across three nations and 16 different cities, also makes the protection perimeter more fragmented, with each node of the system (airports, hotels, stadiums, commercial facilities) becoming a potential point of vulnerability. There is therefore a second level of concern that involves the brands associated with the Fifa World Cup: a recent ProofPoint analysis shows that more than a third (36 per cent to be precise) of the World Cup 2026 partners, sponsors and suppliers do not have advanced security configurations in place to actively block spoofing email attempts.

Which means, for those on the hunt for tickets and promotional offers, direct exposure to apparently legitimate and trustworthy e-mail communications that are instead fraudulent. The underlying problem, as observed by the experts of the Californian cybersecurity company, is the incomplete adoption of the Dmarc (Domain-based Message Authentication, Reporting and Conformance) protocol, today considered the first line of defence against fraud perpetuated via e-mail: only a portion of the organisations analysed use the most restrictive modality, capable of preventing the delivery of unauthorised messages.

The role of artificial intelligence

However, there is no shortage of countermeasures and they basically follow two lines. The first is technological in nature and reflects a predictive approach to security, in which threat intelligence platforms powered by algorithms and agent AI tools play a central role, analysing in real time millions of sources (from social conversations to dark web forums to signals from networks and devices) with the precise objective of identifying anomalous patterns before they translate into concrete attacks. The second refers to human behaviour and weaknesses dictated by urgency or promises of privileged access to certain services.

Copyright reserved ©
Loading...

Brand connect

Loading...

Newsletter

Notizie e approfondimenti sugli avvenimenti politici, economici e finanziari.

Iscriviti