<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Qatar Airways Travel Packages — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/qatar-airways-travel-packages/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 23 May 2026 06:09:19 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/qatar-airways-travel-packages/feed.xml" rel="self" type="application/rss+xml"/><item><title>Fake FIFA World Cup Websites Stealing Credentials and Funds</title><link>https://feed.craftedsignal.io/briefs/2026-05-fake-fifa-sites/</link><pubDate>Sat, 23 May 2026 06:09:19 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-fake-fifa-sites/</guid><description>Fake FIFA World Cup websites are impersonating official ticket and merchandise sales to steal money and personal data from soccer fans through deceptive registration and payment processes.</description><content:encoded><![CDATA[<p>ESET researchers have uncovered multiple fake FIFA World Cup websites designed to deceive soccer fans seeking tickets and merchandise. These websites mimic the official FIFA and World Cup sites, enticing users to register and make purchases through fraudulent payment flows. The attackers utilize tactics such as typosquatting, where domain names closely resemble the legitimate ones, and copying the official FIFA website&rsquo;s look and feel to enhance credibility. The campaign targets individuals eager to secure tickets and merchandise for the 2026 FIFA World Cup, exploiting their enthusiasm and impatience. The fake sites aim to steal financial and identity data, including names, email addresses, phone numbers, and passwords.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Victims are lured to fake FIFA websites through sponsored search results, social media ads, or forwarded links.</li>
<li>The fake website uses a domain name similar to the official FIFA site, employing typosquatting (e.g., ***fifa26[.]shop).</li>
<li>The website replicates the look and feel of the official FIFA site, including colors, layout, and navigation.</li>
<li>Users are prompted to register, providing personal information such as name, email address, and phone number.</li>
<li>The fake website offers tickets and merchandise for purchase, allowing users to add items to a shopping cart.</li>
<li>Users are directed to a payment page where they enter their credit card details.</li>
<li>The entered payment information is stolen by the attackers.</li>
<li>Victims lose money and have their personal and financial data compromised.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The fake FIFA websites lead to financial losses for victims who enter their credit card details. Stolen personal data, including names, email addresses, phone numbers, and reused passwords, can be used for identity theft, financial fraud, and further attacks on other accounts. The campaign targets soccer fans worldwide, aiming to capitalize on the high demand for World Cup tickets and merchandise. If successful, attackers can gain access to victims&rsquo; sensitive information, leading to significant financial and personal harm.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Directly type the official FIFA website address (FIFA.com) into your browser to avoid clicking on potentially malicious links from ads or social media posts (Reference: FIFA official website).</li>
<li>Closely examine domain names for typosquatting attempts (e.g., extra characters, odd endings) before entering any information (Reference: ***fifa26[.]shop and ****26-fifa[.]com).</li>
<li>Deploy the Sigma rule <code>Detect Fake FIFA Website Registration Page</code> to identify suspicious registration pages (Reference: rule).</li>
<li>Deploy the Sigma rule <code>Detect Fake FIFA Website Payment Page</code> to identify suspicious payment pages (Reference: rule).</li>
<li>Use strong, unique passwords for all accounts and enable two-factor authentication to protect against credential reuse (Reference: Overview).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>phishing</category><category>credential-theft</category><category>scams</category><category>fifa</category><category>world-cup</category></item></channel></rss>