Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Qilin Ransomware Lists RDP Auth History on Enumerates Authentication
April 30, 2026
Phoenix PhaaS Fuels Brand Smishing in Finance Platform Drives
April 30, 2026
Targeted Large-Scale Campaign Attacking U.S. Organizations with
April 30, 2026
Home/Threats/Threat Actors Scam Winter Olympics 2026 Fans with Beware Fake
Threats

Threat Actors Scam Winter Olympics 2026 Fans with Beware Fake

Security teams report a rapid expansion of scam operations, evidenced by the active emergence of additional domain registrations. Malwarebytes now blocks these fraudulent domains, safeguarding users...

Emy Elsamnoudy
Emy Elsamnoudy
February 16, 2026 2 Min Read
0 0

Security teams report a rapid expansion of scam operations, evidenced by the active emergence of additional domain registrations. Malwarebytes now blocks these fraudulent domains, safeguarding users worldwide from falling victim to the growing threat.

Fake site offering Tina at a huge discount (Source - Malwarebytes)
Fake site offering Tina at a huge discount (Source – Malwarebytes)

The fraudulent websites lure victims with deep discounts on items that are unavailable elsewhere.

While the official Tina plush toy costs €40 and remains completely out of stock, these fake shops advertise the exact same product for just €20 with banners claiming “UP & SAVE 80%.”

This aggressive pricing strategy serves as irresistible bait to attract unsuspecting Olympic fans who are desperate to purchase the popular merchandise for themselves or their children.

Scam Operation Tactics

The fake Olympic shops operate with multiple malicious objectives that extend far beyond simply taking payment without delivering products.

Threat actors actively harvest payment card details that victims enter during checkout, while simultaneously collecting names, addresses, email addresses, and phone numbers for use in future cyberattacks.

Many victims subsequently receive follow-up phishing emails carefully designed to extract additional sensitive information or login credentials.

Some scammers even distribute malware through fake order confirmations or malicious tracking links sent to victims after purchase, further compromising their devices and networks.

Security experts strongly recommend purchasing merchandise only from the official shop.olympics.com website by typing the address directly into browsers and bookmarking it for future use.

Shoppers should consistently avoid clicking links from advertisements, social media posts, or unsolicited emails. They should remain highly skeptical of extreme discounts being offered on items that are officially sold out everywhere else.

Customers must carefully inspect domain names for suspicious top-level extensions, extra hyphens, or subtle character substitutions before making purchases.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwarephishingSecurityThreat

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

Noodlophile Malware Evolves: Fake Job Post Creators Tactics

Next Post

New Malware Campaigns Turn Devices Into DDoS & Crypto Bots

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Google Gemini CLI Flaws Allow Remote Code Execution on Hosts
April 30, 2026
Jenkins Fixes High-Severity Plugin Flaws: Patches Including
April 30, 2026
WordPress Plugin Hacked Since 2020 to Inject Malicious
April 30, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us