Threat Actors Attacking Fans and Teams of Belgian Grand Prix With Phishing Campaigns


Cybercriminals have launched a sophisticated multi-vector attack campaign targeting fans and teams ahead of the 2025 Belgian Grand Prix, scheduled for July 27 at the iconic Spa-Francorchamps circuit.

The threat actors have deployed an arsenal of tactics including phishing emails, fraudulent ticket websites, malicious streaming platforms, and counterfeit merchandise scams to exploit the global enthusiasm surrounding Formula 1’s premier racing event.

The campaign’s foundation was established through a significant security breach that occurred in early 2024, when threat actors successfully compromised the official Belgian Grand Prix email account.

Google News

This initial foothold enabled attackers to conduct large-scale phishing operations with enhanced credibility, as fraudulent communications appeared to originate from legitimate race organizers.

Phishing email sample sent to fans (Source – Cloudsek)

The compromised infrastructure has since been leveraged to distribute deceptive emails promising discounted tickets and exclusive access to unsuspecting Formula 1 enthusiasts.

CloudSEK analysts identified a dramatic surge in malicious domain registrations specifically crafted to impersonate official Formula 1 and Spa-Francorchamps websites.

The researchers documented 16 suspicious domains, with 14 registered between 2024 and 2025, indicating a coordinated preparation phase leading up to the race weekend.

Fake merchandise site (Source – Cloudsek)

These domains serve multiple malicious purposes, including hosting phishing pages designed to harvest personal and payment information, distributing malware disguised as ticket PDFs or streaming applications, and spreading misinformation to generate fraudulent revenue.

Infrastructure Analysis and Domain Spoofing Tactics

The threat actors have demonstrated sophisticated domain spoofing techniques, registering variations that closely mimic legitimate Formula 1 terminology and branding.

Analysis of the malicious infrastructure reveals a strategic approach to domain selection, with registrations accelerating in the months preceding the Belgian Grand Prix.

Domain NameRegistrarCreation DateExpiration DateDomain AgeRegistrar Country
CHEERGRANDPRIX.COMNetwork Solutions, LLC2025-06-062026-06-06Newly RegisteredUSA
F1GRANDPRIXNEWS.COMMoniker Online Services LLC2024-06-062025-06-061 Year OldUSA
FORMULAGRANDPRIX.COMOVH, SAS2025-05-312026-05-31Newly RegisteredFrance
GRANDPRIXJOBS.COMNameCheap, Inc.2025-05-232026-05-23Newly RegisteredUSA
GRANDPRIXQUADS.COMHOSTINGER operations, UAB2025-06-262026-06-26Newly RegisteredLithuania
GRANDPRIXSTORE.NETLiquidNet Ltd.2025-06-112026-06-11Newly RegisteredUK
GRANDPRIXWATCHSHOP.COMTUCOWS, INC.2025-06-262026-06-26Newly RegisteredCanada
HOLIDAYGRANDPRIX.COMSquarespace Domains II LLC2025-06-012026-06-01Newly RegisteredUSA
ONLINEGRANDPRIX.NETNameCheap, Inc.2025-07-072026-07-07Newly RegisteredUSA
REDBULLUSGRANDPRIX.COMGname 240 Inc2025-06-032026-06-03Newly RegisteredSingapore
S1GRANDPRIX.COMName.com, Inc.2025-06-282026-06-28Newly RegisteredUSA
SELENAGRANDPRIX.COMONLINE SAS2025-06-052026-06-05Newly RegisteredFrance
SHOP-GRANDPRIX.COMNameCheap, Inc.2025-07-162026-07-16Newly RegisteredUSA
VOLTGRANDPRIX.COMWild West Domains, LLC2007-04-092026-04-0917+ Years OldUSA
WEBGRANDPRIX.COMTUCOWS, INC.2024-07-012026-07-011 Year OldCanada
WORLDGRANDPRIX.COMMegazone Corp., dba HOSTING.KR2002-05-052026-05-0522+ Years OldSouth Korea

The attackers have strategically distributed their infrastructure across multiple registrars including NameCheap, Network Solutions, and OVH to evade detection and complicate takedown efforts.

This diversification strategy, combined with the use of legitimate-sounding domain names, creates a formidable challenge for both security teams and potential victims attempting to distinguish authentic platforms from malicious alternatives.

The timing of these registrations, clustered around the race announcement and ticket sales periods, demonstrates careful planning and market awareness by the threat actors.

Integrate ANY.RUN TI Lookup with your SIEM or SOAR To Analyses Advanced Threats -> Try 50 Free Trial Searches



Source link